Information Security Consulting
Information Security Policy Development:
The development of effective Information Security Policies is key to any business, however it is the implementation and monitoring of compliance against these policies that turns these policies into “living” policies.
ICT operational Procedures Development:
The integration of ICT procedures with policies is vitally important in the creation of “living policies”. Alignment to the Best Practice industry standards ensures compliance.
ICT Standards Development:
The development of an ICT Standards manual (aligned to support the policies that have been developed) is another key component of the Information Security foundation.
Security Audits:
Analysis of existing ICT Security coverage against the ICT Security map identifies any gaps in defence.
Security standards alignment with Policies:
Analysis of existing ICT Policies and the identification of gaps within the standards layer mitigates the associated risk.
Information Security Map development:
Consulting services assist IT management in understanding the ICT Security map and the associated risks.
More Information...
