top of page
Security Room

CYBER SECURITY

Develop and mature cyber strategy, risk management and compliance programs

Cyber Security: Text

RISK MANAGEMENT

• Risk Strategy Advisory, Policies and Standards
• Risk Assessments Technology Risk; Cyber Security Risk Management,
Controls Assurance, Compliance Checks
• Risk Identification, Assessment, Treatment, Risk Mitigation,
Monitoring
• Risk Quantification FAIR Risk quantification and evaluation; Risk
based analysis of loss impact and threat likelihood events; controls
risk analysis: Risk Quantification Analysis Probability and Risk Impact
• Risk Probability and Risk Impact Ratings, distributions, loss scenarios
• Top “Ten” Threats List Category Mappings
• Breach Incident Plans and Business Impact Analysis
• Cyber Threat Scenarios and Loss Tables tools

RISK FRAMEWORKS AND PROFILES

• CIS, CSA CCM, NIST CSF to NIST 800 53 Guidelines and standards

CONTROL ASSURANCE

• Review and design of Management, Operational and Technical
controls tailored to industry frameworks and NIST standards.

PRIVACY AND COMPLIANCE AUDITS

• Privacy Impact Assessments (PIA), Privacy Impact Analysis
• PRC Certifications, Risk Scores;

CLOUD

• Migration and Automation Controls, Cloud Security Reviews
• Cloud Security Cloud Security Frameworks, Infrastructure as Code
(IaC) controls selection, policy automation, tools and benchmarks
assurance.
• Hybrid Cloud IaC : AWS, Azure, Google GCP
• Automation Cloud IaC controls and mappings

THIRD PARTY GOVERNANCE REVIEWS

• Compliance, Pre Assessment Audits
• Third Party CIS Benchmarks
• Board level Cybersecurity Compliance

Cyber Security: List
bottom of page