Simplifying Cybersecurity

The world of cybersecurity can be complex and intimidating to many. LCG will simplify it for you. If you are experiencing an active or perceived threat, we can identify, isolate and remediate the issue. If you are seeking proactive measures, such as vulnerability assessments and penetration tests, we can help with cost effective solutions – regardless of the size of your business. 

Cybersecurity Regulation Takes Off for Insurance Providers

State governments are wising up to the constantly changing world of cyber threats and are now holding businesses accountable through legislation. In some states, such as NY, certain licensed entities are required to adopt and maintain cybersecurity programs. The prospect of complying with these regulations may seem daunting to small and medium sized businesses. We are here to prove to you that it is manageable and with our assistance you can create a safer, more secure environment for your confidential, or nonpublic, information. Focus on your business, LCG has you covered.

Cybersecurity 360 - Everything Businesses Need to Survive Today's Threats

  • Computer Forensic Insider Threat Assessment - A targeted evaluation of an employee computer to identify unauthorized data transfer.
  • Penetration Testing - A discovery and analysis of the potentiality and severity of vulnerabilities.
  • Threat Emulation - Simulation of specific adversarial threat attack sets against preexsiting defenses.
  • Social Engineering Campaigns - Evaluation of personnel vigilance and organizational awareness training against cyber attacks.
  • Vulnerability Assessment - Examination of current defensive posture for gaps and areas for improvement.
  • Wireless Assessment - Assessment of physical location wireless network security posture.
  • Physical Assessment - Assessment of physical location access controls and operational security practices.
  • Hunt Operations - Seek and destroy missions for known malicious intrusions into the environment.
  • Incident Response - Includes recovery and restoration of systems after a malicious incident has occurred. 
  • Network Forensic Analysis - Digital forensics of data integrity and transmission, usually as part of an incident response.
  • Policy Auditing - Review of company information security and operational security policies and practices.
  • Compliance Review - Auditing of organizational adherence to regulatory compliance such as PCI-DSS, HIPAA, NIST, OWASP, etc.
  • Remediation Support - Remediation implementation support and validation, usually proceeds a Vulnerability Assessment.
  • Curriculum Development - Design, development, and implementation of cyber awareness and similar training and education program(s).
  • Training and Education - Conduct of cyber-related training and education such as awareness and technical countermeasures.
  • Table-Top-Exercise - Gamified policies and practices review for organizations identifying strengths and weaknesses.



11767 Katy Freeway, Suite 515
Houston, TX 77079

Privacy Policy


Our Clients hire us because we provide honest advice, excellent customer service, and winning solutions based on experience. The best way to find out how we can help you is to call us.

Copyright 2008-2019. LCG Discovery Experts, LLC d/b/a LCG, LLC. All Rights Reserved