Assessment and Consulting

1. Digital Forensic readiness

  • Capture business risks or challenges requiring forensic need
  • Systematic approach to assess the evidence logging, monitoring and preservation
  • Integrating forensic tasks/controls with existing IT security processes
  • Assist in lab setup for Digital Forensic Investigation

Contact Us for more details

 

2. Audit, Assessment and Consultancy for Security Operations Center (SOC)

  • SOC Strategy
  • SOC Design
  • SOC Operations Advisory
  • Event Management Advisory
  • SOC Analytics/Intelligence Advisory

Contact Us for more details

 

3. Audit, Assessment and Consultancy on User/Identity Management

  • Undertake a Comprehensive Gap Analysis
  • Identity and governance: carry out an assessment of your current identity governance and define a design that supports your organisation’s strategy.
  • Privileged account management: evaluates the current maturity of your accounts, identifies strategy and designs the best solution for your customers
  • IAM consulting: Identity life-cycle / security compliance consulting, architecture evaluation
  • User administration & provisioning: User / group / role profiling and consolidation
  • Identity Life-cycle Management: Evaluating compliance and controls evaluation, audits and reports

Contact Us for more details

 

4. Cyber Security in INDUSTRY 4.0

  • Do Assessment
  • Capture business risks and threats
  • Help organisations to be:
    • Secure
    • Vigilant
    • Resilient 

Contact Us for more details

 

5. IoT Security

  • End Device Security
  • Network Security
  • Help organisations for:
    • Prevention
    • Monitoring
    • Detection
    • Respond

Contact Us for more details

 

6. Vendor Risk Management

  • Building Effective Vendor Risk Management Framework
    • Outsourcing objectives and activities
    • Classification of vendors
    • Cataloging og cybersecurity risks 
    • Performance monitoring criteria
    • Contract terms and agreements
    • Develop a system to assess future vendors and set a minimum    acceptable hurdle for the quality of any future third-parties
    • Assess current outsourcing policy and other supporting IT/Organization policies and procedures
  • Vendor Risk Assessment
    • Inventorying of vendors
    • Categorisation of vendors
    • Assess vendors for potential risks
    • Validation of due diligence 
    • Mitigation plan of residual risk
    • Establish contingency plans if a third-party is deemed below quality or a data breach occurs
    • Review current vendor contracts
  • Vendor Risk Management Tool
    • Single repository for contracts, due diligence documentation and outsourcing related policies
    • Automated workflows and assessment of vendors
    • Vendor performance monitoring
    • Executive reporting

Contact Us for more details

WP2Social Auto Publish Powered By : XYZScripts.com