Cyber Security

1. Security Strategy

  • Enterprise Security Architecture design
  • Enterprise Security Strategy
  • Cloud and Virtual Security
  • Intrusion Detection and Prevention
  • Policy Development
  • Public Key Infrastructure

3. Threat and Vulnerability Management

  • Application and Network Penetration Testing
  • Infrastructure / Mobile / Wireless / VoIP / Physical Security Assessment
  • Source Code Review
  • Scada Security Assessment
  • Security Awareness and Social Engineering
  • MBSS creation and implementation

2. Governance, Risk and Compliance

  • GRC framework design, implementation, and automation
  • Implementation of Regulatory standards (ISO, ISR, NESA, HER etc.,)
  • Data classification and security strategy
  • IT/IS Security Assessment and Audit
  • Business Continuity Planning and Disaster Recovery
  • Vendor Risk Assessment

4. Identity and Access Management

  • Identity and Access Management Consulting
  • Enterprise Role Engineering
  • IAM solution evaluation