• Cybersecurity consulting

Cybersecurity consulting

We help financial institutions prevent cyber-attacks and protect their valuable assets. With the exponential growth of external threats and risks, a secure, vigilant and resilient environment is their core competency.

To ensure effective information and technology risk management, cyber risks need to be considered when designing business strategy.

Our services:

CYBER RISK MANAGEMENT SYSTEM
  • Design of a cyber risk management concept 
  • Design of the risk management system architecture
  • Setting up processes, methodologies and procedures
  • Training and education programmes
VULNERABILITY PENETRATION TESTING
  • Infrastructure testing + risk assessment 
  • Mobile application testing 
  • Internet of Things (IoT) and smart devices
  • Industrial Security Devices
SECURITY ASSESSMENTS AND AUDITS
  • Regulatory requirement audits in the banking environment
  • Verification of third party services
  • Information Security Management System (ISMS) audits 
  • Audit of IT economics and IT cost allocation
  • Social engineering
  • Darknet monitoring
THREAT MANAGEMENT
  • Threat modelling
  • Asset identification and classification
  • Inherent risk modelling
  • Key Risk Indicators
  • Operational risk models using external data
  • Security Information and Event Management (SIEM) / Security Operation Center (SOC) consulting
  • Security Incident Response Consulting 
  • Data Protection (GDPR)
CLOUD RISK MANAGEMENT
  • Cloud readiness assessment 
  • Cyber Risk Analysis
  • Gap analysis and migration
  • Asset identification and classification 
  • Solution design and assistance with cloud migration
IDENTITY AND ACCESS MANAGEMENT
  • Alignment of user access rights with their job responsibilities 
  • Risk mitigation by implementing security policies across the organization 
  • Cost management by reducing administrative costs of user management
  • Facilitating the audit of access permissions
  • Access control assessment - review of access rights for different platforms (AD, SAP, Oracle, MS SQL), reconciliation, review of Segregation of Duties
  • Implementation of IDM process (Identity Management) - design, integration and setup of IDM, analysis and preparation of user identities