top of page

Services

Our services are available across your technology cyber environment, the information and operational technologies (IT/OT) that support the core of your business.  The following outlines areas where we deliver value.

Virtual CISO (vCISO)

​

Gain experienced direction and guidance, saving costs while getting the support you need, when you need it.  Areas where you can expect support include: 

  • Compliance

  • Cyber risk management

  • Senior executive and board level communications

  • Mergers and acquisitions

  • Unbiased vendor selection

  • Any of the areas outlined below

 

You get as much or as little support as you need to enable your business.

 

Strategy and Governance

​

Ensure your business drives and measures your cybersecurity needs through development of your:​

  • Cyber strategy

  • Governance structure & operating model

  • Policies & standards

​

Network Security Architecture

​

Assess and/or develop your end-to-end network security architecture:

  • Defence in depth controls (preventive and detective)

  • Secure configuration of operating systems, network devices and applications

  • Segmentation of your IT and OT environments for employees, contractors and third parties

​

Technical Security Assessment

​

Take a deeper technical look into your controls to see how well they enable you to protect, detect and respond:

  • Vulnerability assessment

  • Penetration test

  • Secure configuration and hardware security assessments

​

Continuous Security Monitoring

​

Know that you have the right people, processes and technologies in place to:

  • Monitor your existing security posture

  • Detect when breaches occur

  • Support incident response operations

​

Incident Response

​

Ensure you are sufficiently prepared to respond to the eventual breach of your cyber environment:

  • Incident response plan development

  • Integration of cyber incident response within your existing crisis management framework

  • On-site/remote incident response support

    • overall command and control

    • investigation and analysis

    • containment and eradication

​

Contact us to see where we can support you with a tailored approach to meet your needs.

bottom of page