
Sapper Labs Group

Services
Our Services
Advanced Cyber Defence
Sapper Labs has deployed systems capable of automated threat hunting-at-scale and deploying countermeasures across information and operation technologies, mobility and cloud environments, edge networks, critical infrastructure, and high-value platforms. We can also model and simulate real-world threats within our Advanced Cyber Test Range.
Intelligence-as-a-Service
Sapper Labs provides intelligent insights to a world increasingly described by data. We work at the convergence of physical, cyber, and cognitive domains. Sapper Labs produces tailored competitive intelligence and investigative reporting derived from a wide spectrum of open and commercial sources. We use big-data science, machine learning, artificial intelligence, and brilliant human analysts to make sense of the environment and deliver intelligence that is unique, relevant, timely, accurate and actionable. Our team produces end-intelligence products in direct support of missions. We deliver regional, thematic, and technical studies including detailed and comprehensive intelligence estimates, tailored global cyber intelligence reporting, analysis of geographical area-of-interests or tailored threat assessments. Meanwhile, our strategic analysis group provides fore sighting, thought-leadership, contextualization, and evidence-based decision support.
Security Concierge Services
Sapper Labs provides a menu of Cyber Security Concierge Services which includes but is not limited to:
-
Privacy Impact Assessment.
-
Chief Information Security Officer.
-
Attack surface analysis.
-
Red teams.
-
Penetration testing.
-
Cyber security vulnerability assessments.
-
Cyber asset security baselining.
-
Security audits and risk assessments.
-
Network security engineering.
-
Digital forensics and incident response (DFIR).
-
Threat hunting.
-
Secure communications and network architecture design and integration.
Operational Support Services
Our team has real-world experience operating in contested environments against the most sophisticated adversaries. We provide direct operational support anywhere on the planet. We deliver operational outcomes that matter to our clients for intelligence and cyber missions, including enhanced operational security, privacy, and overwatch.
Tailored Solutions.
Our team provides engineering agility at operational tempo. We can deliver rapid capability development at the speed–of-cyber, engineer bespoke solutions to wicked problems, integrate the very best technology and innovate applied research to field next-generation solutions today. Our intelligence analysts work closely with our engineers to create new tools daily
Regulatory Compliance Services
Sapper Labs can support critical infrastructure sectors to attain and maintain compliance through professional compliance support services, as it relates to numerous enforceable and non-enforceable standards including:
-
North American Electric Reliability Corporation’s Critical Infrastructure Protection Standards (NERC CIPS).
-
Department of Homeland Security’s Chemical Facility Antiterrorism Standards (DHS CFATS).
-
Nuclear Energy Institute’s Cyber Security Plan for Nuclear Power Reactors (NEI 08-09).
-
International Society for Automation Special Publication 99 (ISA SP99);
-
North American Institute for Standards and Technology Special Publication 800-82 (NIST SP800-82).
-
Transportation Security Authority’s Pipeline Security Guidelines (TSA Pipeline Security Guidelines).
-
ISO/IEC 27001 is an international standard to manage information security.
-
IT security risk management: A lifecycle approach (ITSG-33).
-
Security Best Practice Policy for Canadian Telecommunications Service Providers (CTSPs).
-
CSE technology supply chain guidelines (TSCG-01/F).
-
Cybersecurity Maturity Model Certification (CMMC).
Infrastructure-as-a-Service
Sapper Labs engineering deploys high-grade operational security, intelligence and cyber defence capabilities in direct support of operational outcomes for the Country. We specialize in privacy-enhanced ultra-secure technologies supporting adaptive dispersed operations and enhanced mission assurance.
Training and Simulation
We provide advanced investigation techniques, open-source intelligence, cyber security, privacy and defence training to journalists, researchers, intelligence analysts and cyber operators. We leverage our extensive operational depth, training, and simulation technology. We have built a Persistent Training Environment (PTE) consisting of cyber range(s), learning management, student management, evaluation, testing and qualification tracking requirements. We can simulate or sandbox actual operations and train individually and collectively, against real-world scenarios.