Governance

Review and develop your security policies and governance framework so they are aligned to your business objectives

Data Discovery

Identify high value information assets and give them a security classification rating

Access Control

Ensure that access to your offices, systems, processes and sensitive information is aligned to your users roles

Risks & Threats

Conduct risk assessments to understand your risk exposure and develop remediation plans

Security Controls

Develop security controls within your people, processes, technology and third parties that are simple and measurable

Training

Drive information security as a habit in your organization and develop a culture of security ownership and achievement

Incident Management

Develop disaster recovery measures and test security incident plans to ensure effectiveness

Compliance

Drive compliance reporting and continuous security improvement with effective performance indicators

Business Information Security

We want to help you build simple and measurable security controls that are effective in driving and enforcing a culture of security within your people which will in turn promote robustness in your processes and technology.

In the light of continual cyber-attacks, it is paramount that your people, processes and technology work together to create a unified approach and a defence in depth strategy to fend off cyber criminals.

We have worked with clients within media, finance, education, technology, publishing and retail and can use this cross domain experience and innovation in helping you

  • Development and updates of policies and procedures
  • Enterprise architecture reviews and designs
  • Technology procurement, supplier audits and creating or updating supplier management frameworks
  • Secure configuration and network design reviews
  • Develop and review product development life cycles
  • Risk Assess and develop security controls
  • Ensure compliance to industry specific standards and regulations such as NIST, ISO27001, Cyber essentials, PCI DSS etc