top of page

Establishing rock solid cyber security fundamentals is critical to protect your orginisation against today's sophistocated attacks

My Services

Cyber Risk & Governence

Aligning you to industry best practice in Cyber Risk Identification and governance programs to build you company's maturity in Cyber Security, like:

  • NIST Alignment

  • ISO/IEC 27001 Alignment

  • Red Team Program Design

  • Enterprise Cyber Security Standard & Policy Creation

Security Architecture & Engineering

Design & Build the security detection and defence systems needed to protect your business like:

  • SIEM Architecture & Design

  • OT Security Architectures

  • Network & Cloud Security Architecture

  • Honey Pot & Trap Design

  • Security Review Procedures for Reviewing new technology deployments

Cyber Attack Response & Recovery

Formulating and embedding effective response and recovery procedures for cyber attacks 

  • Major Cyber Incident Management procedures

  • Recovery & Backup Infrastructure Design & Procedures

  • Security Operations Centre (SOC) Design

  • Ransomware/Cyber Attack Insurance Consulting

  • Peformance Metric Designs for SOC Teams

Cyber Program Cost Reduction

Whether its is structuring the right size cyber team or selecting the most cost effective cyber tools we can help you with:

  • Cyber Team Organisational Design

  • Cyber Security Tool Consolidation

  • Right sizing cyber security infrastructure

  • Annual Cyber Security Business Plan & Strategy Facilitation for Cyber Team

Innovative Solutions to protect your Attack Surface

Staying up with the latest cyber technology isn't easy, so use us to identify the treasure from the garbage in the latest cyber solutions, and help you build agility in your deployments to be able to adopt them readily

Enterprise Cyber Culture Programs

Building cyber capability and awareness in your organisation with fun and interactive tools like:

  • Email phishing campaigns and programs for employee training

  • Creation of Cyber Security Training modules and programs for enterprise employees 

  • Designing cyber security capability building programs for technical employees

bottom of page