Cyber Security
We will look at your corporate profile, review your business needs and assess areas for improvement from a cost-effective, technological perspective. Through an in-depth examination of your organisation’s internal and external connection points, we will evaluate how secure your data and information assets are, how good your cyber game is once you play with others, how you respond to security incidents, and how you can close your skills’ gap.
Governance
Current state assessment
Cyber security strategy
Merger and Acquisition cyber strategy
Sustainability planning
IT Asset Management
Risk assessment
Business Continuity preparedness
Operations
Data security implementation
Security solutions: sourcing and implementation
SOC implementation
Vulnerability Assessment and Penetration Testing (VAPT)
Identity and Access Management
Security monitoring
Incident tracking and response
Continued Compliance
ISMS checks
Review of security policies, procedures, baselines and standards
Third-party risk management
Training
Information Security Training
ISMS Implementation Training
Information Security awareness training
Business Continuity Training
Third party-risk management
ISO 27001 Preparedness and Alignment (Information Security Management System)
ISO 27701 Preparedness and Alignment (Privacy Information Management System)
ISO 22301 Preparedness and Alignment (Business Continuity Management System)
Disaster Recovery Plan
Business Impact Analysis