arrow_upward

Cybersecurity Consulting

Cybersecurity Consulting

We help financial institutions prevent cyber-attacks and protect their valuable assets. With the exponential growth of external threats and risks, a secure, vigilant and resilient environment is their core competency.

To ensure effective information and technology risk management, cyber risks need to be considered when designing business strategy.

Our services:

CYBER RISK MANAGEMENT SYSTEM

  • Design of a cyber risk management concept
  • Design of the risk management system architecture
  • Setting up processes, methodologies and procedures
  • Training and education programmes


VULNERABILITY PENETRATION TESTING

  • Infrastructure testing + risk assessment
  • Mobile application testing 
  • Internet of Things (IoT) and smart devices
  • Industrial Security Devices


SECURITY ASSESSMENTS AND AUDITS

  • Regulatory requirement audits in the banking environment
  • Verification of third party services
  • Information Security Management System (ISMS) audits 
  • Audit of IT economics and IT cost allocation
  • Social engineering
  • Darknet monitoring


THREAT MANAGEMENT

  • Threat modelling
  • Asset identification and classification
  • Inherent risk modelling
  • Key Risk Indicators
  • Operational risk models using external data
  • Security Information and Event Management (SIEM) / Security Operation Center (SOC) consulting
  • Security Incident Response Consulting 
  • Data Protection (GDPR)


CLOUD RISK MANAGEMENT

  • Cloud readiness assessment
  • Cyber Risk Analysis
  • Gap analysis and migration
  • Asset identification and classification 
  • Solution design and assistance with cloud migration


IDENTITY AND ACCESS MANAGEMENT

  • Alignment of user access rights with their job responsibilities
  • Risk mitigation by implementing security policies across the organization 
  • Cost management by reducing administrative costs of user management
  • Facilitating the audit of access permissions
  • Access control assessment - review of access rights for different platforms (AD, SAP, Oracle, MS SQL), reconciliation, review of Segregation of Duties
  • Implementation of IDM process (Identity Management) - design, integration and setup of IDM, analysis and preparation of user identities

Main contact persons