top of page
WKTA_Cybersecurity Banner.png

Cybersecurity, Risk & Privacy

Risk Assessment

Through our thorough cybersecurity posture assessments, we help organisations and governments identify the full extent of vulnerabilities across their various assets. Our customised comprehensive action plans will highlight critical actions that must be prioritised in an organisation to ensure a strong cybersecurity posture.
Services provided include: 

Network and System Audit​

  • Conducted to analyse, study and gather data about a network and its systems with the purpose of ascertaining its health in accordance with the network’s/organisation’s requirements and permissions granted to authorised users.

  • Provides insight into the efficacy of network control and practices, i.e. its compliance with internal and external policies and regulations.

Vulnerability Assessment

  • Networks: Includes scanning for, detecting, and analysing security vulnerabilities in network infrastructure, with a focus on ensuring resilience to cybersecurity threats. 

  • Systems: Includes a systematic review of security weaknesses in an information system. It evaluates whether the system is susceptible to any known vulnerabilities, assigns severity levels to those vulnerabilities, and recommends remediation or mitigation, if and where needed. 

  • Applications: A process of identifying, assessing and managing the potential risks to an application. It will help prevent the exposure of security defects and vulnerabilities, and allows clients to view the application through the eyes of cybercriminals. and attacker. 

Penetration Testing

  • External Penetration Testing: Conducted from a remote location against the organisation's external facing technology, such as their website and external network servers. 

  • Internal Penetration Testing: Conducted from within the organisation's internal network. This test is useful in determining how much damage an insider (such as disgruntled employee) can cause from behind the company's firewall. 

Cybersecurity Advisory

We assist governments, businesses and critical infrastructure providers to review, assess, design, manage and implement changes that help improve their organisation's resilience to cyberattacks.
Our advisory services include:

  • Design and implementation of national Computer Incident Response Team (CIRT)/Computer Emergency Response Team (CERT) 

  • ISO 27001 – Information security management systems 

  • Design and development of national cybersecurity strategy and policies 

  • Development of national cybersecurity training roadmaps 

  • National cybersecurity awareness campaigns 

  • Cybersecurity legislation 

  • Child Online Protection (COP) 

Solution Implementation

We work closely with our partners and vendors to deploy reliable and cost-effective cybersecurity solutions for our clients, aimed at achieving maximum efficiency, productivity and resilience. Our cybersecurity experts have extensive knowledge and experience working with various security standards, frameworks and regulations, guaranteeing continued and safe business operations during the implementation phase of a new cybersecurity solution. Cybersecurity solutions include (and are not limited to):  

 

  • Encryption 

  • Identity access management 

  • Network access control 

  • Data loss prevention 

  • Cloud security 

Training & Development

NATIONAL CYBERSECURITY STRATEGY (NCS)

STANDARDS & COMPLIANCE (SNC) 

PRIVACY & DATA PROTECTION (PDP)

CRITICAL NATIONAL INFRASTRUCTURE PROTECTION (CNI)

CYBERSECURITY PUBLIC POLICY (CPP)

TECHNOLOGY (TEC)

CYBERSECURITY EDUCATION (CED)

Start Learning

Register your interest and we’ll be in contact to share further details shortly.

Your Selected Courses

NCS01: National Cybersecurity Strategy Lifecycle

NCS02: Managing and Organising a CERT

NCS03: Incident Handling and Response

SNC01: ISMS for Organisations

SNC02: Risk Management Strategy

SNC03: GDPR Implementation & Compliance

SNC04: Introduction to Cybersecurity Audit

PDP01: Protecting National Sovereignty Through Cybersecurity

PDP02: Data Privacy & Social Networks

PDP03. Protecting Kids Online

CNI01: Introduction To Critical National Information Infrastructure Protection

CNI02: Critical National Information Infrastructure Protection Workshop
– Transportation Sector Case Study

CNI03: Critical National Information Infrastructure Protection Workshop
– Financial Sector Case Study

CNI04: Critical National Information Infrastructure Protection Workshop
– Energy & Power Sector Case Study

CNI05: Critical National Information Infrastructure Protection Workshop
– Water and Utilities Sector Case Study

CNI06: Critical National Information Infrastructure Protection Workshop
– Food and Agriculture Sector Case Study

CNI07: Critical National Information Infrastructure Protection Workshop
– Government Services Sector Case Study

CNI08: Critical National Information Infrastructure Protection Workshop
– Healthcare Sector Case Study

CNI09: Critical National Information Infrastructure Protection Workshop
– Information Technology Sector Case Study

CNI10: Critical National Information Infrastructure Protection
– Emergency Services Case Study

CNI11: Critical National Information Infrastructure Protection
– National Defence Case Study

CNI12: Critical National Information Infrastructure Protection Workshop

CPP01: Budgeting for Cybersecurity Programmes

CPP02: Cybersecurity for e-Gov Services

TEC01: Introduction to Security Awareness

TEC02: Security Awareness Workshop

TEC03: Social Engineering & Ransomware

TEC04: Access Control and Password Management

TEC05: Understanding Digital Forensics and Its Lifecycle

TEC06: Securing Your Data Centre

CED01: Building a Cybersecurity Training Roadmap

CED02: Training and Retaining Cybersecurity Staff

Thank you!

An error occurred. Try again later

bottom of page