The explosion of data generated by digital technology, combined with a new degree of connectedness among organisations, means that there is ripe opportunity for the technologically savvy and criminally minded to take advantage.
We help our clients prepare themselves for cybersecurity threats, ensure ongoing protection, react effectively to attacks and drive change to improve their cybersecurity capability. Our methodology, depicted in steps below, is designed to help you identify, protect, detect, respond and recover from cyber-attacks.
Identify: Identify cybersecurity risks and vulnerabilities
We help organisations understand their current exposure to cybersecurity risk and support them to develop an effective security capability. Our services include cybersecurity risk and threat assessments; cyber health checks; security policy development; security process or technical assessments; and third-party and supply chain cybersecurity assurance.
Protect: Protect critical infrastructure assets
We develop and implement the technical framework and broader processes required to protect your organisation. Our services include security architecture; security technology implementations; security process design and implementation; identity and access management; privacy and data protection; GDPR and POPI advisory; data classification; enterprise application integrity; security awareness training; cybersecurity audits; security hardening; cloud security; vulnerability assessments; and penetration testing.
Detect: Detect the occurrence of a cyber event
We help organisations develop and implement the appropriate activities to detect the occurrence of a cyber security event. Our services include Security log review and monitoring (SOC, SIEM); Threat Hunting and Cyber Risk Monitoring.
Respond: Respond to a detected event
We work with organisations to support and monitor their cybersecurity operations and help them respond rapidly and forensically in the event of a security or data breach. Our services include digital forensics and investigations, incident response and monitoring. Our services include digital forensics and investigations, incident response and monitoring.
Recover: Recover from a cyber event
We help organisations develop and implement the appropriate activities, prioritized through the organization’s risk management process, to restore the capabilities or critical infrastructure services that were impaired through a cybersecurity event. Our services include advisory and assurance on business continuity management, disaster recovery and cyber insurance.
Head of Cyber AdvisoryFind out more