Scan | Secure | Sustain |
||
Starting from £5,000 | Starting from £7,500 | Starting from £7,500 pa |
||
Identify | Risk Assessment | ✓ | ✓ | ✓ |
Ethical hack of your systems | ✓ | ✓ | ✓ |
|
Risk Management Strategy | ✓ | ✓ | ✓ |
|
Protect | Remediation Plan | ✕ | ✓ | ✓ |
Protective Technology | ✕ | ✓ | ✓ |
|
Access Control | ✕ | ✓ | ✓ |
|
Data Security | ✕ | ✓ | ✓ |
|
Protection Processes and Procedures | ✕ | ✓ | ✓ |
|
Awareness and Training | ✕ | ✓ | ✓ |
|
Detect | Security Continuous Monitoring | ✕ | ✕ | ✓ |
Detection Processes | ✕ | ✕ | ✓ |
|
Respond | Response Planning | ✕ | ✕ | ✓ |
Forensic Analysis | ✕ | ✓ | ✓ |
|
Mitigation | ✕ | ✓ | ✓ |
|
Improvements | ✕ | ✓ | ✓ |
|
Communications | ✕ | ✓ | ✓ |
|
Recover | Recovery Planning & Execution | ✕ | ✕ | ✓ |
Improvements | ✕ | ✕ | ✓ |
|
Communications | ✕ | ✕ | ✓ |
A well proven cybersecurity framework (NIST)
Our services are articulated around a number of stages defined by a well-proven Cybersecurity Framework (NIST). These include the following:
Identify
Our experts can help you identify the risks surrounding your technical platforms, processes and internal and external resources to ensure your organization has awareness of its vulnerabilities. This is a fundamental step in preparing yourself for the occurrence of a black swan, your organisation tolerance for risk will then dictate how to respond.
Protect
Our cybersecurity engineers can design and implement robust solutions to address the risks around unauthorized access and potential data leaks. We can assist you in maintaining this edge on an ongoing basis via scheduled maintenance and upgrades to these technical solutions. Equally importantly, we can help you establish a culture of security via training, awareness, and education of your staff to ensure that you have the required processes and procedures to minimise the potential attack surface.
Detect
We can provide services and solutions to continuously monitor and track the smallest signs of intrusion and take actions if it happens, including coordination of the required investigative actions and stakeholder communication about what has happened.
Respond
Black swans exist. Irrespective of being able to identify risks, and whether you are protected, you need a response plan to resume business and minimise business impact in the event that an incident happens. The key is in preparation and planning. Via our Respond process we will work with you to develop response planning and mitigation procedures based on various scenarios, and to implement improvement actions as required.
Recover
Our teams are trained to offer an effective and rapid response in case of incident. We would help you recover from that situation and assist you in executing a communication plan both internally and externally to allow you to coordinate your business response to all stakeholders. In addition our teams would collect any forensic evidence required to support any legal action. Our teams would also help you implement an improvement plan and lessons learned to ensure that your systems and processes become more resilient.
Our service levels include:
Our services can either be offered in isolation or as part of your organization’s efforts to obtain a formal security certification.
The “Audit” and “PEN test” assist as a fulfilment of many of the ISO 27001 controls that are used on an ongoing basis. We can identify gaps in your processes and vulnerabilities in your systems and technologies.
Specifically, the PEN test can be used as part of ISO27001 Annex .12.6.1