Information Security Consultancy
Programme Management, Project Management, IT Security, Computer Security, Information Security, ISO 17799, BS 7799, Gap Analysis, Risk Analysis, Information security Standards, Education, Training, Business Continuity Planning, BCP, Health check
Conduct consultancy services in the following information security areas:
- Programme & Project Management
- IT Security Policy Development
- IT Security Procedures
- Risk Analysis
- HMG Information security Standards
- Business Impact Analysis
- Computer Security Audit
- Education and Training
- Business Continuity Planning
Risk Analysis Survey the risk exposure in a client's IT systems in terms of system continuity, penetration, hacking and theft of information. Programme & Project Management Project management for information security implementation. IT Security Policy Development. Develop a corporate IT security policy which reflects the needs of the business and its exposure to risk. IT Security Procedures
Develop detailed security controls and procedures for IT environments to comply with the ISO/IEC 1 7799:2000 - Code of Practice for Information Security Management. ISO/IEC 1 7799 and Gap Analysis and Health check reviews of Security Operating Procedures.
HMG Information security Standards
Give the complex nature of risk assessment in Information Technology, it is a baseline requirement that those responsible for securing protectively marked information will comply with the Information security Standard, which has been specifically tailored to the current HMG security environment. CESG CLAS Scheme consultant will work with clients to determine the appropriate levels of assurance to ensure that protectively marked information is adequately protected and to prepare Assurance Document Sets. Business Impact Analysis
Build a catalogue of threats and vulnerabilities relating to their business and the potential impacts.
Computer Security Audit
Conducting audits of business computing systems to assess their compliance with the ISO/IEC 17799 - Information Security Management. Education and Training
Provision of Information Security training courses at locations throughout the
Providing in-house training courses for groups of staff in the organization.
In particular, tailor-made security awareness training for management and staff. Business Continuity Planning
Plan for a recovery of a business operations following a disaster that might befall the client's business systems and resources. Estimates suggest that 75% of businesses never recover from a major disaster.
Disaster Recovery and Business Continuity
Threat and Causes of disaster Security IT and disaster recovery consultant have extensive experience of preparing disaster recovery and continuity plans for clients from such varied backgrounds as banking, insurance, airlines, oil and gas facilities and investment houses. The key requirement is obviously to identify the main types of natural and man-made disasters that might overwhelm any company in a particular country, location or a particular kind of business.
The business impact analysis. The most important aspect, however, is the business impact analysis to identify which sections of the business actually contribute the most profit and contribution to the corporation and whose loss would undoubtedly cause the closure of the business. The recovery process and plan Once the business impact analysis has identified the most critical sections, departments, facilities or dependencies within the business then the continuity or the recovery programme can identify how these processes, systems, facilities or buildings can be duplicated, copied, backed up or replaced in the event of disaster.