Cyber Security

We will look at your corporate profile, review your business needs and assess areas for improvement from a cost-effective, technological perspective. Through an in-depth examination of your organisation’s internal and external connection points, we will evaluate how secure your data and information assets are, how good your cyber game is once you play with others, how you respond to security incidents, and how you can close your skills’ gap.  

Governance

Current state assessment

Cyber security strategy

Merger and Acquisition cyber strategy

Sustainability planning

IT Asset Management

Risk assessment

Business Continuity preparedness

Operations

Data security implementation

Security solutions: sourcing and implementation

SOC implementation

Vulnerability Assessment and Penetration Testing (VAPT)

Identity and Access Management

Security monitoring

Incident tracking and response

Continued Compliance

ISMS checks

Review of security policies, procedures, baselines and standards

Third-party risk management

Training

Information Security Training

ISMS Implementation Training

Information Security awareness training

Business Continuity Training

Third party-risk management

ISO 27001 Preparedness and Alignment (Information Security Management System)

ISO 27701 Preparedness and Alignment (Privacy Information Management System)

ISO 22301 Preparedness and Alignment (Business Continuity Management System)

Disaster Recovery Plan

Business Impact Analysis