Monitoring deep, dark and surface web to detect exposure of your sensitive data, secret projects and initiatives, privileged users, critical systems, IT infrastructure, and more.
Monitoring and alerting of third party data breaches impacting your employees’ emails, usernames, and personally identifiable information.
Assess the risk footprint and security posture of key business relationships to get a handle on external risk introduced through your extended attack surface.

Sign Up for Updates

Digital risk monitoring of key personnel with telemetry and risk metrics. VIPRecon provides broad coverage of social media, deep and dark web, as well as physical threat assessments.
Our Ransomware Response Readiness Assessment, Playbook and Table Top Exercise gives your organization the best chance to survive and recover.
Gain visibility of your digital footprint by reaching into the most active areas of the cyber underground.
Fully managed and tailored Threat Intelligence services that becomes an extension of your current security processes and provides real-time visibility on new threats.
Providing research and investigations into known threats, to save security teams time and stress during a cyber emergency.

Sign Up for Updates

GroupSense offers a comprehensive package of services for assessing and responding to ransomware attacks, including negotiations with threat actors.
Actively researching and monitoring threats from vendors or third-party companies that can affect organizational security.
Monitoring for threats to elections, VIPs, and more on social media to proactively prevent or mitigate digital risk.
Focusing on the threats and risks that matter to your security processes and providing intelligence and insights to prevent or mitigate digital risk.
Taking the next step in security services, by proactively taking down phishing sites or anonymously interacting with threat actors to provide better intelligence.
Active monitoring of your brand's digital assets to protect its reputation and stop further brand abuse from targeting unsuspecting victims.

Sign Up for Updates

Combining your cyber and fraud programs to effectively fight threat actors continually scamming or threatening assets within an organization.
Executives are prime targets for fraudulent activities, but with a proactive approach, any attacks or threats can be neutralized before causing any damage.
Governments, political parties and candidates must all act now to activate cyber threat intelligence services to harden their information security and get ahead of inevitable cyber threats to the election process.
Ransomware_Training

Ransomware Negotiation Training

Specialized negotiation training for attorneys and cybersecurity law firms

Ransomware negotiation is a complex process. Preparing your attorneys for threat actor engagement minimizes damage to your client's organization.


Your clients' needs are changing to stay ahead of emerging cybersecurity threats. With ransomware complaints to the FBI rising 50% from 2020-2021, your firm needs expert negotiators that understand the differences between business negotiations and ransomware negotiations. In this three-day group training, GroupSense and Max Negotiating will give your attorneys proven strategies for successful ransomware negotiation. By staying on top of emerging cyber threats, your firm will minimize damage to your clients and guide them to a best-case ransomware outcome. After completing the three-day training, your attorneys will:

  • Understand the difference between ransomware negotiations and business negotiations
  • Know the in-and-outs of a ransomware attack
  • Learn the intricacies of threat actor engagement
  • Discern their role in a ransomware negotiation
  • Master a tailored ransomware negotiation strategy

Comprehensive, Tailored Training

Every organization is different: different business needs, different negotiating styles, and different people. GroupSense's Ransomware Negotiation Training accounts for those differences by creating a custom case simulation tailored to your client's goals and needs that will prepare your negotiators for the worst. Over three days, facilitators will lead your attorneys through the simulation and teach them specialized negotiation tactics to advance their skillset.

Day 1

On Day 1, participants will understand the client's crisis by learning the anatomy of a ransomware attack, master the nuances of ransomware negotiation, and better understand the ransomware ecosystem. At the end of the day, participants will develop a ransomware response checklist that minimizes damage to clients throughout the initial decision-making process.

 


Day 2

Participants will run through a simulated ransomware attack, from first notification all the way through to threat actor engagement. During the simulation, participants will understand the urgency of an attack and the precision required in threat actor engagement. We record the simulation for review on Day 3. 

 


Day 3

Together, we will analyze the simulation videos and all participants will receive advice on improving their threat actor engagement tactics to address any vulnerabilities. At the conclusion of the training, participants will walk away with an actionable negotiation playbook.

Max_negotiation_logo

 

We partnered with Max Negotiating to combine GroupSense's field experience with Max Negotiating's deep knowledge of the negotiation process. Together, we provide a well-rounded training agenda that will give your team the tools to engage successfully with threat actors. Learn more about Max Negotiating here.

ARE YOU RANSOMWARE NEGOTIATION READY? 

GroupSense has been on the front lines with small and large organizations alike, performing ransomware negotiations or assisting with their recovery from a ransomware attack.
Download the Ransomware Negotiation Training datasheet to learn more.

GroupSense Ransomware Negotiation Training

DOWNLOAD

Get Recognized Expertise

GroupSense gives your organization the preparation it needs to quickly and decisively respond to a ransomware attack.

Our team has been recognized by various outside sources for their expertise in ransomware negotiation and response.

A look at who has recognized us: Featured Ransomware Resources