This site uses cookies to provide you with a more responsive and personalised service. By using this site you agree to our use of cookies. Please read our PRIVACY POLICY for more information on the cookies we use and how to delete or block them.
  • Cybersecurity consulting

Cybersecurity consulting

We help financial institutions prevent cyber-attacks and protect their valuable assets. With the exponential growth of external threats and risks, a secure, vigilant and resilient environment is their core competency.

To ensure effective information and technology risk management, cyber risks need to be considered when designing business strategy.

Our services:

CYBER RISK MANAGEMENT SYSTEM
  • Design of a cyber risk management concept 
  • Design of the risk management system architecture
  • Setting up processes, methodologies and procedures
  • Training and education programmes
VULNERABILITY PENETRATION TESTING
  • Infrastructure testing + risk assessment 
  • Mobile application testing 
  • Internet of Things (IoT) and smart devices
  • Industrial Security Devices
SECURITY ASSESSMENTS AND AUDITS
  • Regulatory requirement audits in the banking environment
  • Verification of third party services
  • Information Security Management System (ISMS) audits 
  • Audit of IT economics and IT cost allocation
  • Social engineering
  • Darknet monitoring
THREAT MANAGEMENT
  • Threat modelling
  • Asset identification and classification
  • Inherent risk modelling
  • Key Risk Indicators
  • Operational risk models using external data
  • Security Information and Event Management (SIEM) / Security Operation Center (SOC) consulting
  • Security Incident Response Consulting 
  • Data Protection (GDPR)
CLOUD RISK MANAGEMENT
  • Cloud readiness assessment 
  • Cyber Risk Analysis
  • Gap analysis and migration
  • Asset identification and classification 
  • Solution design and assistance with cloud migration
IDENTITY AND ACCESS MANAGEMENT
  • Alignment of user access rights with their job responsibilities 
  • Risk mitigation by implementing security policies across the organization 
  • Cost management by reducing administrative costs of user management
  • Facilitating the audit of access permissions
  • Access control assessment - review of access rights for different platforms (AD, SAP, Oracle, MS SQL), reconciliation, review of Segregation of Duties
  • Implementation of IDM process (Identity Management) - design, integration and setup of IDM, analysis and preparation of user identities