OUR FRAMEWORK

 

 

APPROACH DIAGRAM PHASES

An overview of your business and its current cyber security maturity
Understanding your critical IT assets and the impact of CIA: Confidentiality, Integrity and Availability
Identifying the greatest cyber threats to your most crucial IT assets and business processes
Conducting a risk assessment and evaluating which of these threats pose the greatest risk to you (High, Medium & Low)
Advise and support strategies, architecture and solution design to mitigate the identified risks in your environment
Assist with the governance of your in-house or outsourced vendors to deploy and implement the security controls
Stay up to date with current cyber incidents and threats specific to your industry

 

 

SECURITY DOMAINS

Focuses on the threats and vulnerabilities of unauthorised online access and overal use of the internet
Procedures and techniques used to protect email accounts and communication against unauthorized access, spam, loss, compromise, impersonation and ransomware
Protecting data from an unauthorised access (Confidentiality), unathorised changes (Integrity) and ensuring data availability
Protecting sensitive data stored on company managed devices and portable devices (BYOD) such as laptops, smartphones and tablets
Protecting individual’s identity through the management and governance of digital access within the organisation
A set of policies, controls, procedures and technologies that protect your cloud platforms (IaaS, PaaS, SaaS) and your data within it. This includes providing visibility and the enforcement of shadow IT
Features or functions added to software to prevent data or code within the app from being stolen or changed
The process by which an organisation handles a data breach or cyber-attack. A clear incident response plan is established and tested before an attack may happen
Business Continuity and Disaster Recovery is a set of processes and techniques used to help an organisation recover from a disaster and resume routine in the case of a cyber attack
Security Information and Event Management software works by collecting log and event data generated by applications and security devices by bringing it together into a single centralised platform
Security awareness training makes your team become defenders against cyber threats by becoming the first line of defence