OUR FRAMEWORK

APPROACH DIAGRAM PHASES

An overview of your business and its current cyber security maturity


Understanding your critical IT assets and the impact of CIA: Confidentiality, Integrity and Availability


Identifying the greatest cyber threats to your most crucial IT assets and business processes


Conducting a risk assessment and evaluating which of these threats pose the greatest risk to you (High, Medium & Low)


Advise and support strategies, architecture and solution design to mitigate the identified risks in your environment


Assist with the governance of your in-house or outsourced vendors to deploy and implement the security controls


Stay up to date with current cyber incidents and threats specific to your industry

SECURITY DOMAINS

Focuses on the threats and vulnerabilities of unauthorised online access and overal use of the internet


Procedures and techniques used to protect email accounts and communication against unauthorized access, spam, loss, compromise, impersonation and ransomware


Protecting data from an unauthorised access (Confidentiality), unathorised changes (Integrity) and ensuring data availability


Protecting sensitive data stored on company managed devices and portable devices (BYOD) such as laptops, smartphones and tablets


Protecting individual’s identity through the management and governance of digital access within the organisation


A set of policies, controls, procedures and technologies that protect your cloud platforms (IaaS, PaaS, SaaS) and your data within it. This includes providing visibility and the enforcement of shadow IT


Features or functions added to software to prevent data or code within the app from being stolen or changed


The process by which an organisation handles a data breach or cyber-attack. A clear incident response plan is established and tested before an attack may happen


Business Continuity and Disaster Recovery is a set of processes and techniques used to help an organisation recover from a disaster and resume routine in the case of a cyber attack


Security Information and Event Management software works by collecting log and event data generated by applications and security devices by bringing it together into a single centralised platform


Security awareness training makes your team become defenders against cyber threats by becoming the first line of defence
