Cybersecurity, Risk & Privacy
Risk Assessment
Through our thorough cybersecurity posture assessments, we help organisations and governments identify the full extent of vulnerabilities across their various assets. Our customised comprehensive action plans will highlight critical actions that must be prioritised in an organisation to ensure a strong cybersecurity posture.
Services provided include:
Network and System Audit
-
Conducted to analyse, study and gather data about a network and its systems with the purpose of ascertaining its health in accordance with the network’s/organisation’s requirements and permissions granted to authorised users.
-
Provides insight into the efficacy of network control and practices, i.e. its compliance with internal and external policies and regulations.
Vulnerability Assessment
-
Networks: Includes scanning for, detecting, and analysing security vulnerabilities in network infrastructure, with a focus on ensuring resilience to cybersecurity threats.
-
Systems: Includes a systematic review of security weaknesses in an information system. It evaluates whether the system is susceptible to any known vulnerabilities, assigns severity levels to those vulnerabilities, and recommends remediation or mitigation, if and where needed.
-
Applications: A process of identifying, assessing and managing the potential risks to an application. It will help prevent the exposure of security defects and vulnerabilities, and allows clients to view the application through the eyes of cybercriminals. and attacker.
Penetration Testing
-
External Penetration Testing: Conducted from a remote location against the organisation's external facing technology, such as their website and external network servers.
-
Internal Penetration Testing: Conducted from within the organisation's internal network. This test is useful in determining how much damage an insider (such as disgruntled employee) can cause from behind the company's firewall.
Cybersecurity Advisory
We assist governments, businesses and critical infrastructure providers to review, assess, design, manage and implement changes that help improve their organisation's resilience to cyberattacks.
Our advisory services include:
-
Design and implementation of national Computer Incident Response Team (CIRT)/Computer Emergency Response Team (CERT)
-
ISO 27001 – Information security management systems
-
Design and development of national cybersecurity strategy and policies
-
Development of national cybersecurity training roadmaps
-
National cybersecurity awareness campaigns
-
Cybersecurity legislation
-
Child Online Protection (COP)
Solution Implementation
We work closely with our partners and vendors to deploy reliable and cost-effective cybersecurity solutions for our clients, aimed at achieving maximum efficiency, productivity and resilience. Our cybersecurity experts have extensive knowledge and experience working with various security standards, frameworks and regulations, guaranteeing continued and safe business operations during the implementation phase of a new cybersecurity solution. Cybersecurity solutions include (and are not limited to):
-
Encryption
-
Identity access management
-
Network access control
-
Data loss prevention
-
Cloud security
Training & Development
NATIONAL CYBERSECURITY STRATEGY (NCS)
STANDARDS & COMPLIANCE (SNC)
PRIVACY & DATA PROTECTION (PDP)
CRITICAL NATIONAL INFRASTRUCTURE PROTECTION (CNI)
CYBERSECURITY PUBLIC POLICY (CPP)
TECHNOLOGY (TEC)
CYBERSECURITY EDUCATION (CED)
Start Learning
Register your interest and we’ll be in contact to share further details shortly.
Your Selected Courses
NCS01: National Cybersecurity Strategy Lifecycle
NCS02: Managing and Organising a CERT
NCS03: Incident Handling and Response
SNC01: ISMS for Organisations
SNC02: Risk Management Strategy
SNC03: GDPR Implementation & Compliance
SNC04: Introduction to Cybersecurity Audit
PDP01: Protecting National Sovereignty Through Cybersecurity
PDP02: Data Privacy & Social Networks
PDP03. Protecting Kids Online
CNI01: Introduction To Critical National Information Infrastructure Protection
CNI02: Critical National Information Infrastructure Protection Workshop
– Transportation Sector Case Study
CNI03: Critical National Information Infrastructure Protection Workshop
– Financial Sector Case Study
CNI04: Critical National Information Infrastructure Protection Workshop
– Energy & Power Sector Case Study
CNI05: Critical National Information Infrastructure Protection Workshop
– Water and Utilities Sector Case Study
CNI06: Critical National Information Infrastructure Protection Workshop
– Food and Agriculture Sector Case Study
CNI07: Critical National Information Infrastructure Protection Workshop
– Government Services Sector Case Study
CNI08: Critical National Information Infrastructure Protection Workshop
– Healthcare Sector Case Study
CNI09: Critical National Information Infrastructure Protection Workshop
– Information Technology Sector Case Study
CNI10: Critical National Information Infrastructure Protection
– Emergency Services Case Study
CNI11: Critical National Information Infrastructure Protection
– National Defence Case Study
CNI12: Critical National Information Infrastructure Protection Workshop
CPP01: Budgeting for Cybersecurity Programmes
CPP02: Cybersecurity for e-Gov Services
TEC01: Introduction to Security Awareness
TEC02: Security Awareness Workshop
TEC03: Social Engineering & Ransomware
TEC04: Access Control and Password Management
TEC05: Understanding Digital Forensics and Its Lifecycle
TEC06: Securing Your Data Centre
CED01: Building a Cybersecurity Training Roadmap
CED02: Training and Retaining Cybersecurity Staff
Thank you!
An error occurred. Try again later