Advisory Logo

Digital Security Consulting

Align executive strategy to operational execution and controls. Avoid critical control failures by fusing people + process + technology.

Advisory Black Grid


Analyze your current Security Operations Capbilities to determine the current state of effectiveness vs. where you want to be. The deliverable is actionable, decision-driving data that will help our clients improve their security operations capabilities in the following key areas of analysis:  


Right tools for the end outcome?


Generating Alerts that Matter?



Normalize. Correlate. Enrich.



TCM + Policy Decisions.



Measure Performance. Measure what matters.

Tailored Assessments for Specific Outcomes

The first step in building an effective IT security program is gaining a thorough understanding of your current security posture. Our assessments help provide this understanding. Assessments may be technical in nature or may be more policy, governance, or risk focused.

SECOPS Capability

Visibility. Intelligence. Respose.

Identify the inputs, outputs, methods, processes, and metrics that are in place, as well as how to optimize moving forward. 

Web App Pentest

Idenitify. Validate. Remediate.

Determine weaknesses in public and private web applications, and identify what to do to prevent re-occurrence.  

Network Pentest

Identify. Validate. Remediate.

Identify issues on the internal and partner networks to prioritize remediation efforts and collaborate with network infrastructure and management teams to mitigate existing weaknesses. 

IOT Assessment

Enable New Lines of Revenue.

Avoid key failures in venturing into this new space by identifying areas of weakness in devices, communications, cloud processing, data management, and partner interfaces. 

Hybrid Risk


Assess overall posture with a hybrid assessment identifying policy, human capital, technical, and architectural areas for improvement. 


Real security is dirty

Customer Testimonial

Westrock talks about working with Rook

Case Study

An overview of Rook’s work with GMR

News Article

10 Attributes of a NextGen Security Program