We provide information and Cyber Security services to organisations nationally and internationally.
Operations
We can come and monitor our implemented mitigating controls and review to ensure that they are working as planned, and that the calculated residual risk level is accurate.
Understanding an organization and its context.
Customer Focused
We can come and monitor our implemented mitigating controls and review to ensure that they are working as planned, and that the calculated residual risk level is accurate. Understanding an organization and its context.
Managing Risk
Defining a risk management approach.
Selecting of risk analysis methodologies.
Defining risk evaluation criteria.
Threat Identification
Identification of assets, threats, existing controls, vulnerabilities and consequences impacts
Evaulation
Assessing of consequences and incident likelihood. Determining the level of risk
Evaluating risk scenarios.
Evaluating risk treatment options. Selecting and implementing information security controls and performing a risk management review