
CYBER SECURITY
Develop and mature cyber strategy, risk management and compliance programs
RISK MANAGEMENT
• Risk Strategy Advisory, Policies and Standards
• Risk Assessments Technology Risk; Cyber Security Risk Management,
Controls Assurance, Compliance Checks
• Risk Identification, Assessment, Treatment, Risk Mitigation,
Monitoring
• Risk Quantification FAIR Risk quantification and evaluation; Risk
based analysis of loss impact and threat likelihood events; controls
risk analysis: Risk Quantification Analysis Probability and Risk Impact
• Risk Probability and Risk Impact Ratings, distributions, loss scenarios
• Top “Ten” Threats List Category Mappings
• Breach Incident Plans and Business Impact Analysis
• Cyber Threat Scenarios and Loss Tables tools
RISK FRAMEWORKS AND PROFILES
• CIS, CSA CCM, NIST CSF to NIST 800 53 Guidelines and standards
CONTROL ASSURANCE
• Review and design of Management, Operational and Technical
controls tailored to industry frameworks and NIST standards.
PRIVACY AND COMPLIANCE AUDITS
• Privacy Impact Assessments (PIA), Privacy Impact Analysis
• PRC Certifications, Risk Scores;
CLOUD
• Migration and Automation Controls, Cloud Security Reviews
• Cloud Security Cloud Security Frameworks, Infrastructure as Code
(IaC) controls selection, policy automation, tools and benchmarks
assurance.
• Hybrid Cloud IaC : AWS, Azure, Google GCP
• Automation Cloud IaC controls and mappings
THIRD PARTY GOVERNANCE REVIEWS
• Compliance, Pre Assessment Audits
• Third Party CIS Benchmarks
• Board level Cybersecurity Compliance