The TALAS Control Stack

Simplifying cybersecurity means breaking it down into its most basic parts. In order to do this in a consistent way we've developed our TALAS Control Stack Framework. This approach provides a method to look at cybersecurity from a simply and consistently.

Using the TALAS Control Stack Framework allows you to dissect even the most complex cybersecurity problems by distilling them into their most basic parts, and by doing so navigate them with clarity and confidence.


  • The control stack is a proprietary framework that TALAS developed to help simplify cybersecurity. We use this framework to break down complex cybersecurity problems into their most basic components. By doing this we can explain even the most complex cybersecurity topics in the simplest of terms.

  • The TALAS control stack makes you consider cybersecurity as a whole. From basic tasks like keeping antivirus software up to date to more complicated things like handling security incidents, viewing cybersecurity as a collection of controls that work together helps everyone understand it better.

  • The Control Stack Framework is structured as a hierarchy of interconnected cybersecurity control elements. Each element is designed to link back to the others. As you define and connect these individual elements, it becomes easier to gauge the maturity level of whatever you're using the control stack to describe.

  • Absolutely! We're thrilled when people approach cybersecurity from this perspective. The more you organize your program based on its control components, the clearer your cybersecurity strategies will become.

DIRECTIVES represent the various drivers of a cybersecurity program. These can be frameworks, regulations, internal strategy, or other requirements that an organization must address.

POLICIES establish an operational commitment. They define how you will operate and identify where and when exceptions to those commitments are and are not acceptable.

STANDARDS implement the approved operating state for an organization. They are used to operationalize policy and translate external mandates into internal requirements.

TECHNOLOGY controls enable capabilities that allow you to control the use of our technology resources and the actions on your network.

PROCESS defines the steps taken to generate an outcome. They outline how a desired result is achieved.

PEOPLE own, implement, and execute controls and will remain accountable to a control, its performance, health, and output.

SERVICES organize connected control elements and define how they are engaged, maintained, and measured when providing a benefit to an organization.

Full Cyber Program Management

vCISO

Our vCISO service offers the advantage of comprehensive cybersecurity PROGRAM management. TALAS will simplify, organize, and strengthen your cybersecurity program.

Cybersecurity Program Assessment

BLUEPRINT

Blueprint builds the foundation for your cybersecurity program, identifying your cyber controls, building your processes and organizing your STRATEGY.

Cybersecurity Controls Assessment

DISCOVER

Discover is designed to understand your cybersecurity CONTROLS, map your cyber control ecosystem, drive control efficiency, and build operational capability.

Tabletop & Incident Response Assessment

CHALLENGE

Challenge dives into your cybersecurity Incident RESPONSE process so you know what actions to take and test the capabilities you have. Play today to respond tomorrow.

TALAS Professional Services 

CONSULTING & ADVISORY

The TALAS Professional Services offer a range of flexible solutions designed to ADAPT to your organization's evolving needs.