top of page

Services

Our Services

Intelligence-as-Service

Sapper Labs provides intelligent insights to a world increasingly described by data. We work at the convergence of physical, cyber, and cognitive domains. Sapper Labs produces tailored competitive intelligence and investigative reporting derived from a wide spectrum of open and commercial sources. We use big-data science, machine learning, artificial intelligence, and brilliant human analysts to make sense of the environment and deliver intelligence that is unique, relevant, timely, accurate, actionable and cost-effective. Our team produces tailored end-intelligence products in direct support of missions. We deliver regional, thematic, and technical studies including detailed and comprehensive intelligence estimates, tailored global cyber intelligence reporting, analysis of geographical area-of-interests or tailored threat assessments. Meanwhile, our strategic analysis group provides foresighting, thought-leadership, contextualization, and evidence-based decision support.

Operational Support Services

Our team has real-world experience operating in contested environments against the most sophisticated adversaries. We provide direct operational support anywhere on the planet. We deliver operational outcomes that matter to our clients for intelligence and cyber missions, including enhanced operational security, privacy, and overwatch.

Cyber Defence

Sapper Labs has deployed systems capable of automated threat hunting-at-scale and deploying countermeasures across information and operation technologies, mobility and cloud environments, edge networks, critical infrastructure, and high-value platforms. We can also model and simulate real-world threats within our Advanced Cyber Test Range.  

Security Concierge Services

Sapper Labs provides a menu of Cyber Security Concierge Services which includes but is not limited to:

 

  • Privacy Impact Assessment.

  • Chief Information Security Officer.

  • Attack surface analysis.

  • Red teams.

  • Penetration testing.

  • Cyber security vulnerability assessments.

  • Cyber asset security baselining.

  • Security audits and risk assessments.

  • Network security engineering.

  • Digital forensics and incident response (DFIR).

  • Threat hunting.

  • Secure communications and network architecture design and integration.

Tailored Solutions.

Our team provides engineering agility at operational tempo. We can deliver rapid capability development at the speed–of-cyber, engineer bespoke solutions to wicked problems, integrate the very best technology and innovate applied research to field next-generation solutions today. Our intelligence analysts work closely with our engineers to create new tools daily

Regulatory Compliance Services

Sapper Labs can support critical infrastructure sectors to attain and maintain compliance through professional compliance support services, as it relates to numerous enforceable and non-enforceable standards including:

 

  • North American Electric Reliability Corporation’s Critical Infrastructure Protection Standards (NERC CIPS).

  • Department of Homeland Security’s Chemical Facility Antiterrorism Standards (DHS CFATS).

  • Nuclear Energy Institute’s Cyber Security Plan for Nuclear Power Reactors (NEI 08-09).

  • International Society for Automation Special Publication 99 (ISA SP99);

  • North American Institute for Standards and Technology Special Publication 800-82 (NIST SP800-82).

  • Transportation Security Authority’s Pipeline Security Guidelines (TSA Pipeline Security Guidelines).

  • ISO/IEC 27001 is an international standard to manage information security.

  • IT security risk management: A lifecycle approach (ITSG-33).

  • Security Best Practice Policy for Canadian Telecommunications Service Providers (CTSPs).

  • CSE technology supply chain guidelines (TSCG-01/F).

  • Cybersecurity Maturity Model Certification (CMMC).

Infrastructure-as-a-Service

Sapper Labs engineering deploys high-grade operational security, intelligence and cyber defence capabilities in direct support of operational outcomes for the Country. We specialize in privacy-enhanced ultra-secure technologies supporting adaptive dispersed operations and enhanced mission assurance. 

Training and Simulation

We provide advanced investigation techniques, open-source intelligence, cyber security, privacy and defence training to journalists, researchers, intelligence analysts and cyber operators. We leverage our extensive operational depth, training, and simulation technology. We have built a Persistent Training Environment (PTE) consisting of cyber range(s), learning management, student management, evaluation, testing and qualification tracking requirements. We can simulate or sandbox actual operations and train individually and collectively, against real-world scenarios.

bottom of page