banner-img

Cybersecurity

Governance

Aligning Corporate-, IT- and Cybersecurity Governance programs and initiatives to the relevant international standards and best practice frameworks.

CORPORATE

GOVERNANCE

King IV training and advise to assist boards of directors and executive management to establish or improve their Corporate Governance capabilities.

IT

GOVERNANCE

We provide COBIT 2019 assessment services and implementation support to CIO’s and IT management to enhance their IT governance and IT management programs, practices and processes.

CYBERSECURITY

GOVERNANCE

We assist organisations with the establishment of Cybersecurity Governance structures and processes to evaluate, direct and monitor their organisation’s cybersecurity threat, control and risk postures.


 

Risk management advise to help organisations understand and manage the full scope of risks (strategic, operational, financial, digital, etc.) facing their organisations.

Risk

ENTERPRISE & OPERATIONAL

RISK

We assist organisations to gain a clear, consolidated view of risk across your business by aggregating disparate risk information in one central solution.

IT RISK & CYBER

RISK

Compile a complete picture of technology- and security-related risks and understand their financial impact to improve decision-making.

THIRD PARTY

RISK

Get an accurate picture of third-party risk while managing and monitoring the performance of third-party relationships and engagements.


Compliance

Establish a sustainable, repeatable and auditable regulatory compliance program by consolidating information from multiple regulatory bodies.

COMPLIANCE

PROGRAMS

We assist you to design, implement and automate corporate and IT compliance programs that cover the compliance universe of external, corporate and functional internal compliance requirements.

POPI & GDPR

COMPLIANCE

We provide assistance with POPI and GDPR compliance and related Data Protection & Privacy program establishment.

SAMA & NCA ECC

COMPLIANCE

We provide cybersecurity assessment and implementation services to assist Saudi Arabian organisations to comply with the Saudi Arabian Monetary Agency (SAMA) and the National Cyber Agency (NCA) Essential Cybersecurity Controls (ECC) requirements.


 

Cybersecurity
Assessment Services

Assess and mitigate cybersecurity and technology risk, from a business perspective, covering the full spectrum of cybersecurity functions – Identify – Protect – Detect – Respond – Recover

 

Cyber Threat

Intelligence

Our cyber threat assessment service provides an assessment of a client’s critical threat information which is exposed to the internet.

NIST CSF

Assessment

We utlise the NIST Cybersecurity Framework (NIST CSF) to assist organisations to identify and prioritise remediation actions for reducing cybersecurity risk.

CIS

Assessment

Our security technology service utilises the CIS “Critical Security Controls for Effective Cyber Defence” to benchmark a client’s in-depth cyber-defence posture, covering the Cloud-, Perimeter-, Network-, Endpoint- , Application and Data domains.

Vulnerability Assessment

Our vulnerability assessment service utilises vulnerability software to scan your environment to understand the cyber exposure of all of your critical IT assets (vulnerabilities and misconfigurations).After analysis of the scanned results, we design a multi-phase roadmap to remediate the vulnerabilities across your complete cyber-attack surface.

Cyber Risk Assessment

We assist organisations to identify, assess, report and mitigate their key cyber-threat exposures and cybersecurity risks.We work with you to analyse your risks to produce a cybersecurity risk assessment report, risk treatment plan and road map.

Cyber Risk Quantification

Our cyber risk quantification assessment utilises the Open FAIR cyber risk quantification methodology to analyse, quantify and report client’s cyber risk in financial terms.We also provide cyber risk quantification advise to establish a risk quantification capability, and also offer cyber risk quantification pilots to adopt the FAIR methodology.

 


 

Cybersecurity
Consulting Services

Enhance and transform your cybersecurity program and practice – from protected, responsive to resilient.

Cybersecurity Remediation

Planning

We assist clients with the development of structured and prioritised cybersecurity implementation plans and road maps to enhance their cybersecurity governance and management practices in order to become more secure, responsive and resilient.We utilise the outputs of the cybersecurity assessments to identify projects, budget and implementation road maps.

Cybersecurity Implementation

Programs

Our cybersecurity transformation service assists client to implement executive-led cybersecurity transformation programmes.We work with you to develop and embed a cybersecurity risk culture by defining, delivering, and managing transformation programmes to improve technical skills, foster cybersecurity awareness and implement plans needed to effect lasting cybersecurity transformation.

Cybersecurity Strategy

Development

Our security technology service utilises the CIS “Critical Security Controls for Effective Cyber Defence” to benchmark a client’s in-depth cyber-defence posture, covering the Cloud-, Perimeter-, Network-, Endpoint- , Application and Data domains.

Cybersecurity Process &

Operating Models

We assist clients to enhance their cybersecurity processes and operating models, that cover appropriate target states for roles, responsibilities, related processes, governance and management functions.

Cybersecurity Framework &

Policies

We assists clients to build effective and efficient cybersecurity frameworks, policies, procedures and standard that are required to govern and manage the processes, information and systems directly involved in the delivery of critical business services and functions.

Cybersecurity Risk

Management Programs

Our experienced consultants assist clients to leverage risk management best practices and technologies to establish and/or enhance their cybersecurity risk management programs and processes.

Cyber Risk Quantification

Advise

We assist client to leverage cyber risk quantification best practice to adopt and implement a cyber risk quantification framework and programme.We can also assist you with quantifying the cyber risk your organisation faces, improve the accuracy of your cybersecurity risk registers, create and update your cybersecurity treatment plans, and develop a roadmap for success.

Cybersecurity Technology

Architecture

We assist client to establish and implement a cybersecurity technology architecture framework to ensure the security and resilience of your IT systems and assets, consistent with the appropriate policies, procedures and agreements.

Cloud Security & Migration

Advise

Our cloud security service assist clients in the move towards secure, cloud-based environments, including AWS and Azure.We help with the evaluation of cloud migration requirements, building business cases, developing secure cloud operating models and assist with vendor evaluation.

OT & IOT

Security

We offer OT & IOT readiness assessments, and assist clients to align their OT and IOT securitu vision with the business objectives.

Data Protection & Privacy

We assist clients to develop and implement data protection and data governance programs and frameworks to provide an approach to proactively minimise the likelihood and impact of data leaks.

Cybersecurity Operations

We assist client to enhance their cybersecurity operations that include establishment and or enhancement of aspects such as log-, event-, vulnerability- threat- and incident management.

 

Cybersecurity Incident

Management

We assist clients with the establishment or improvement of their cybersecurity incident management plans and programs.Our approach makes provision for integrating the cybersecurity incident management plans with your IT Continuity and Business Continuity programs and plans.

Cybersecurity Competency

Management

We provide assistance with cybersecurity competency frameworks and job descriptions.

Cybersecurity Coaching &

Mentorship

We provide cybersecurity coaching and mentorship support, enabling Information Security managers and officers to execute their cybersecurity activities effectively.This makes provision for the transfer of cybersecurity knowledge from the consultant to the client.

 


 

Information Security

ISMS Implementation and ISO 27001 Certification Assistance

ISO 27001

ASSESSMENTS

We conduct ISO 27001 assessments.

ISO 27001

IMPLEMENTATION

We provides ISO 27001 implementation assistance.

ISO 27001

CERTIFICATION

We provide ISO 27001 certification assistance.

ISO 27001 POLICIES AND

PROCEDURES

We assist wit the development of ISO 27001 required Information security policies, standards, guidelines and procedures.

Vulnerability

Management

Using Tenable’s vulnerability software, we assess and translate raw vulnerability data into business insights to help security teams prioritise and focus remediation based on business risk.

Vulnerability Assessment

Vulnerability Managed Service

Vulnerability Software


 

IT Governance

Services

Assisting CIO’s and IT management to enhance their IT governance and IT management programs, practices and processes.

IT GOVERNANCE ASSESSMENT

Our IT Governance and IT Management assessments provide the basis for IT Governance implementation and performance management.We assist clients by consucting assessments of their IT Governance and IT Management capability and maturity – based on the COBIT 2019 Performance Management (CPM) Framework.

IT GOVERNANCE IMPLEMENTATION

We assist client to implement IT Governance programs using COBIT 2019. This involves assistance with the development and implementation of IT Governance and IT Management policies, frameworks, processes and organisation structures.Our implementations are supported by the use of our COBIT 2019 Implementation Accelerator Portal.

IT STRATEGY DEVELOPMENT

We offer IT strategy facilitation and development support.

 


 

Assisting CIO’s and IT service management to enhance their IT service management programs, practices and processes.

IT Management

Services

ITIL

Enhance IT service management practices and processes using ITIL.

ISO 20000

ISO 20000 implementation and certification assistance.

IT CONTINUITY

Devedoping IT Continuity and information security incident management plans.