Assess

Cyber Security Consulting

Cyber Security can be complex. It’s a maze of cyber threats, security controls, data breach laws, risk calculations, compliance and regulation. You need to increase protection but remain cost conscious and on-budget. You need to access broad range of knowledge and deep experience to help you navigate this challenging, dynamic environment. Cyber Research can provide expert consulting on-demand to help guide you through the cyber maze.

Z

Risk Assessment

Taking a mature risk management approach to cyber security is the right path to better protection. We are experienced at assessing risk wherever it arises. We assess threats, controls, governance, maturity and deliver cyber security improvement strategies to help your company achieve its compliance and risk management goals.

Cyber Health Checks

Cyber Research has deep experience assessing organisations against global and local compliance frameworks and assessing overall cyber maturity of the whole organisation. For those wanting to get to the heart of the matter fast, we’ve developed our own 50-point cyber health check, combining the best technical and governance standards. Completing a 50-point health check helps our customers understand where they are today, and know exactly how to reach their cyber security improvement goals, in the fastest time.

Cyber Security Strategy

Cyber security strategy is organisation-wide, not just about IT. We are experienced at taking companies through a rigorous cyber security strategy development process which aligns security to business goals and enables innovation, rather than hinders it.

Threat and Control Analysis

Identifying threats and assessing controls is our consulting team’s bread and butter. We help organisations to see the unknown threats that make them vulnerable to cyber attack and we tailor the right control strategies to suit business context and budgets.

h

Security Programme Implementation

In today’s market it’s hard to find genuine experts who can set up and run an effective cyber security project or full program of work. Cyber Research’s consulting team has the experience and expertise in subject matter and project management to lead and deliver your cyber security project.

Embedded Expertise

Need a security expert on hand to help you run projects or champion security in your team? Cyber Research offers embedded IT security experts on projects between three months and 12 months, for approved customers. As well as accessing expertise that’s hard to find in the traditional job market, our embedded consultants are able to access the collective expertise of the Cyber Research team, and are mentored by our consulting practice leadership team.

Incident Response Planning

When a cyber incident strikes, following a well-prepared Incident Response Plan is the only thing that stands between you and a full-blown crisis. Cyber Research has crafted incident response plans for numerous organisations and can help you design and operationalise cyber incident response in your organisation.

PCI-DSS

Cyber Research can provide qualified PCI QCA consultants to undertake your PCIDSS audit. The Payment Card Industry Data Security Standard (PCI DSS) was developed to enhance cardholder data security and facilitate adoption of consistent data security globally. PCI DSS provides a baseline of technical and operational requirements designed to protect account data.

~

ISO27K

The ISO/IEC 27000 family of standards help organizations keep information assets secure. Using this family of standards will help your organization manage the security of assets such as financial information, intellectual property, employee details or information entrusted to you by third parties. Using this family of standards will help your organization manage the security of assets such as financial information, intellectual property, employee details or information entrusted to you by third parties. Cyber Research can provide experience consultants to help you through the process of ISO27K family compliance from an initial gap analysis through to a full audit.