Governance
Review and develop your security policies and governance framework so they are aligned to your business objectives
Data Discovery
Identify high value information assets and give them a security classification ratingAccess Control
Ensure that access to your offices, systems, processes and sensitive information is aligned to your users rolesRisks & Threats
Conduct risk assessments to understand your risk exposure and develop remediation plans
Security Controls
Develop security controls within your people, processes, technology and third parties that are simple and measurableTraining
Drive information security as a habit in your organization and develop a culture of security ownership and achievementIncident Management
Develop disaster recovery measures and test security incident plans to ensure effectivenessCompliance
Drive compliance reporting and continuous security improvement with effective performance indicatorsBusiness Information Security
We want to help you build simple and measurable security controls that are effective in driving and enforcing a culture of security within your people which will in turn promote robustness in your processes and technology.
In the light of continual cyber-attacks, it is paramount that your people, processes and technology work together to create a unified approach and a defence in depth strategy to fend off cyber criminals.
We have worked with clients within media, finance, education, technology, publishing and retail and can use this cross domain experience and innovation in helping you
- Development and updates of policies and procedures
- Enterprise architecture reviews and designs
- Technology procurement, supplier audits and creating or updating supplier management frameworks
- Secure configuration and network design reviews
- Develop and review product development life cycles
- Risk Assess and develop security controls
- Ensure compliance to industry specific standards and regulations such as NIST, ISO27001, Cyber essentials, PCI DSS etc