Trust

New technologies now drive marketing and customer-oriented initiatives, while Information Security chases associated cyber threats from behind. Disruptions created by digital technologies create privacy, social media, operating model and technology oriented risks that clients must understand and adequately address. Targeted risk assessments can be performed and controls implemented to address the new risks surfacing from digitally disrupted functions and industries. Digital innovation can also be embraced to empower the security function to address these risks by adopting leading edge technologies and security tools. We help clients assess new and existing digital initiatives to identify digital risks they may give rise to, develop methods of mitigating those risks and protect against a wide range of cyber risks e.g. cyber attacks, rogue employees, BYOD, data privacy etc. Our work with clients help them to determine, assess and manage these risks.

We help clients build trust and confidence in their products and services, providing resilience in a volatile world.

And, we discover how to deliver value from risk, shifting from prevention to enablement.

Security Transformation

  • Security program assessment
  • Security strategy and roadmap
  • Security risk assessment
  • Benchmarking
  • Security reporting and metrics
  • Third-party risk assessment

Cyber Threat management

  • Threat Intelligence
  • Security monitoring
  • Incident response
  • Vulnerability Identification
  • Remediation
  • Countermeasure planning

Identity and access management

  • Strategy and governance
  • Request and approval
  • Provisioning and de-provisioning
  • Enforcement
  • Review and certification
  • Roles and rules management
  • Reconciliation
  • Reporting and analytics

Data protection

  • Data protection strategy
  • Host security
  • Asset management
  • Data loss prevention (DLP)
  • Compliance and certification
  • Privacy program assessment, remediation and implementation

Resilience

  • Business continuity management strategy
  • Emergency management
  • Incident management
  • Technology resilience
  • Supply chain disruption response
  • Sustainability
  • Predictive risk modelling