Cyber security framework, strategy and program transformation.
Security policy and standards framework definition.
Cyber security skill development and enhancement programs.
Stakeholder sensitization and awareness.
Small business cyber security strategy.
Certification advisory services – ISO 27000 Series, PCIDSS, SOX, GDPR.
Cyber threat assessment.
Enterprise cybersecurity architecture design and definition.
Supply chain security architecture and implementation.
Cloud and mobility security architecture.
Internet of Things Security (IoT).
The Active Discovery to discover advanced threats through a combination of baiting, analytics and reverse engineering.
Network and host compromise assessment.
Honeypots, custom baits and sinkholes.
Vulnerability assessment and penetration testing.
Application security and source code assessment.
Mobile and cloud application security assessment.
Payment devices security assessment.
Financial Security compliance audits.
Insider threat management.
Context-sensitive vulnerability advisories.
IT risk management.
Information lifecycle management services.
Business continuity management services.
Third-party vendor security governance.
Vendor Due diligence.
Incident response and crisis management.
Third-party reporting, notification and disclosure.
Remediation planning and implementation.
Internal Cyber Security for Employee.
BCM trainings and BCM audits/reviews.
Threat intelligence and cyber exposure.
Data Privacy Management System (DPMS).
IT Security Audit and Data services.
Regulatory, Supervisory and compliance.
Performance and GAP Analysis.