Services

Risk Identification

Our key deliverable for the Risk Identification engagement is to provide you with a list of cybersecurity risks ordered by their potential financial impact to your business.

To better understand your risks we will analyze your business attack surface, attack vectors and any existing cybersecurity controls.

We will engage with key people at your business to understand your target market, operating environment, technology infrastructure, information assets, key systems and processes as well as any regulation your business require to comply with.

Following from this engagement we will recommend commencing with a security program design.

/

Security Program Design

Our key deliverable for this engagement is an actionable program, set to address all key cybersecurity risks the business is facing.

Following the American National Institute of Standard and Technology (NIST) Cyber Security Framework (NIST CSF) we will organize those risks against the framework key functions (Identify, Protect, Detect, Respond and Recover), consider the different risk correction strategies and put forth for implementation the most appropriate approach.

We will provide the business with a realistic view of the effort and cost involved bridging the gap between their current vulnerable position and where they need to be.

As the effectiveness of the program rely on a proper discovery of key cybersecurity risks we strongly recommend starting with the Risk Identification engagement.

Controls Implementation

We offer a targeted, risk based engagement where we would analyze the cybersecurity risk you are facing and provide you with our recommendation for the most cost-effective risk correction approach.

Where the correction will require the implementation of a new control, we will provide you with our house view of what we consider “best of breed” solution, giving due consideration to your business particulars.

Security Program Review

The business cybersecurity program should evolve as the business, regulated environment and threat landscape changes. It is therefore imperative for the program to be reviewed periodically, and adjust accordingly.

Our engagement therefore aim to assist your business meeting the following 2 objectives:

  1. Evaluate and tune the Security program to ensure it is as relevant and effective in delivering maximum benefit to your business
  2. Fast track program implementation through better focus and prioritization of program components

Protect your clients, your business and your future. Secure your business success.