Cyber Security Consulting Services

Enterprise Security, Cyber & Operational Resilience

“Threats are constant, Vulnerabilities prevail without our knowledge, Risks vary by time, resulting impact is
on Business, hence Business wide Program is the need”

Strategy Development

Formulating a Strategy to address Compliance, Information Security & Business Continuity Plans to Business objectives, with a clear road map that are progressive

Risk Advisory

Strategic & Tactical Risk Management & Techniques on Technology, Process and associated areas.

Operational Resilience, Contingency Planning

Formal end to end Planning on Crisis Management, Business Continuity, Disaster Recovery including
Technology aspects

Crisis Management & Response Planning

Crisis, security and incident response planning for high risk scenarios

Data Privacy Implementation

Strategic and tactical approaches to address Privacy challenges, implementation issues, cross border issues by a Framework

IT Risk Management

Focused assessment and mitigation of technology risks covering systems, networks, applications

Business Impact Analysis

Study and assessment of Business processes, analysis of critical processes that require attention to establish
operational resilience

Compliance Programme Development

A full programme Management Plan across areas on information security, business continuity, disaster
recovery to sustain and increase degree of compliance

IT Compliance Services

Suite of IT Services to support Compliance Objectives on Malware, Systems updates, Internet use, Email use,
Software compliance, exception misuse

Cloud Security Evaluation

Architectural and implementation review of Cloud security plans, organisation of technology layers,
interconnection of on premises to cloud environments

Threat Hunting

360 degree – Threat landscape encompassing areas on- Compliance, information security and business continuity

Security Architecture & Analysis

Enterprise security architecture, analysis of Security operations, vulnerabilities and deficiencies in security practices vis-à-vis business needs

Data Privacy Impact Assessment

Personal Data Inventory, Classification and impact assessment of personal data breach against set of privacy requirements

Business & Security Process Integration

Processing mapping of Business and work streams and aligning security processes, controls to create operational efficiency

Business Process Vs Application Dependency Assessment

Alignment of IT Business Solutions and processes to core business processes, prioritization approaches to strike cost balance and operational compliance

Policy Exception Process Development

A process and technique on exception management of policies, risks sign off, ownership on risk reduction against exceptions

Compliance & Security Performance Metrics

Full framework and Maturity model for compliance & security aspects and measurements for improving maturity.

Security Process Education & Training

Security awareness, training, education planning, content development, continuous awareness techniques, evaluation across hierarchies of the organization