Cyber Security
Allow people, processes and technologies to protect the organization from internal and external attacks
Strategy and Governance
Develop strategies, policies, governance models and controls to manage the Cyber Security.
- Organizational and Technological model
- Framework and methodology
- Policies, Standards, Processes and Guidelines
- Maturity Assessment, Posture and Gap Analysis
- Training and Awareness
- Cyber Security program and certification
Digital Identity
Identity and access management to ensure users management, right privilege and validation process based on security principles
- Identity and Access Management (IAM) design
- RACI model
- Least privileged, SOX matrix, Need to Know policies
- Identity and access architecture and design
Application Security
Manage security into the enterprise and custom applications that support the business
- Secure software development lifecycle (SDLC)
- Application security testing (source code review)
- Software development
- Governance, risk and compliance (GRC) tools
Cyber Defense
Define and implement an effectiveness defense leveraging analysis and monitoring solutions
- Network scan
- Infrastructure vulnerability management
- Security Operation Center model
- Security Reporting
Security Architecture
Design an end-to-end security architecture based on international standard framework and security best practice
- Asset Management
- Design and controls security architecture framework (SABSA, TOGAF, OSA, O-ESA)
Individual, sustainable solutions that are tailored to the specific needs of your company and based on innovative collaboration approach to grow confidently the operational resilience and cyber security