Advisory Services
Compliance Services
Standards/Regulatory/Legislative Based Assessment Service
Technical and Procedural Controls Design
Technical and Procedural Controls Alignment to Business Processes
Compliance Management and Reporting
Cyber Defense Center (“CDC”)/(SOC) Services
CDC Review Service
CDC Assessment and Design
The objective of the CDC Assessment and Design service:
- Define the posture of the actual CDC’s Security Services levels, evaluating the technological aspects as the organizational and process ones (AS IS);
- Evaluating the actual requirements/controls, in order to measure the current level according to the CMM (Capability Maturity Model);
- Execute a Gap Analysis against the Cyberm CDC Management System;
- Define a Security Roadmap to improve the CDC Services and the related processes, organization and technology (TO-BE).
CDC Process Development/Operational Manual
Cyberm will review the Customer’s existing processes and procedures as well as the CDC model required. Based on the outcome of the Assessment/Review process and Cyberm’s CDC Operation best practices, a list of processes and procedures will be determined in coordination with the Customer.
OTHER SECURITY ADVISORY SERVICES
Penetration Testing
1. Network Penetration Test
2. Web Application Penetration Test
3. Mobile Application Penetration Test
4. Wireless Security Assessment
Network Vulnerability Assessment
Social Engineering Vulnerability Assessment
The assessment models specific attack vectors, identifies potential areas of risk, locates sources of information and resource leakage, and validates identified vulnerabilities.
Cyberm suggests performing at least two (2) different simulations of Social Engineering attacks:
- Spear phishing
- Spreading a malicious payload (backdoor) using USB devices
Network Architecture Assessment
Data Loss Prevention Risk Assessment
Our consultants team helps to create and implement data security policies to discover, monitor, and protect confidential data wherever it is stored or used
Data Loss Prevention Maturity Assessment
Using Cyberm services‘ DLP-specific maturity model framework and experienced consultants, organisations can understand the strengths and weaknesses within their DLP investment. The Assessment service offers professional insight and deep technical expertise into methods to increase the performance of the solution and improve overall DLP capability and maturity for the organisation.
The benefit of this service is that it will help reduce customer pain points by reducing the likelihood and impact of experiencing data breaches, non-compliancy and the resultant risks to the business, and ensure long-term value from DLP.
Data Loss Prevention Business Enablement Service
Using Cyberm services‘ DLP-specific maturity model framework and experienced consultants, organisations can understand the strengths and weaknesses within their DLP investment. The Assessment service offers professional insight and deep technical expertise into methods to increase the performance of the solution and improve overall DLP capability and maturity for the organisation.
The benefit of this service is that it will help reduce customer pain points by reducing the likelihood and impact of experiencing data breaches, non-compliancy and the resultant risks to the business, and ensure long-term value from DLP.
DLP Service Champions Enablement
Provide the business assessment skills required to operate a DLP service. Topics addressed during the service:
- Why DLP? Principles of Monitoring and legal considerations
- Description of the DLP service in Customer
- Drivers, constraints, dependencies (standards, policies, regulations)
- Identifying sensitive data (provide common lexicon of terms)
- Risk based targeting
- Structured / unstructured data at rest
- Data in Motion
- Data in Use
- Operating Model and Stakeholder roles and responsibilities
- Incident Response Workflow
- Policy Management Rights
- Success Measurement and Reporting (KPI)
- Employee Communications and end-user awareness
Etc.
Security Architecture Review
It will also determine whether Customers have correctly provisioned their security infrastructure with the Customers existing solutions and to highlight any weaknesses or gaps in the Customer’s infrastructure.
The Cyberm consultant will assist with providing qualitative data to determine how effective the products are from the Vendor, while mitigating the risks of unplanned downtime.
Cyber Security Framework Development
- Framework Core – Controls.
- Framework Implementation.
Identifying the correct approach could be a momentous task. The framework will follow an approach that will provide confidence to the customers to implementing the framework.
Example: Cyberm would provide a high-level approach that aligns to international recommendation, the following 8 elements are recommended by the G7 for Cyber Security, which Cyberm will adopt, for Financial institutions:
- Element 1: Cyber Security Strategy and Framework
- Element 2: Governance
- Element 3: Risk and Control Assessment
- Element 4: Monitoring
- Element 5: Response
- Element 6: Recovery
- Element 7: Information Sharing
- Element 8: Continuous Learning
Compliance Risk Assessment & Treatment Service
As part of Customer’s Information Security enhancement activities, Customer’s are required to determine their Information Systems Risks and prepare and enhance risk treatments plans. This way top management of a Customer will obtain and maintain a specific overview of the risks introduced to information technologies and at the same time will support the adoption and deployment of specific controls and countermeasures in an effort to reduce this risks to an acceptable level. Typical activities addressed during this service:
- Report of the current IT risks
- Risk treatment plans associated with IT risks over the acceptable level
- Repeatable IT risk management methodology
- Traceable IT risk management process
Risk Assessment
Risk is normally defined as the chance or likelihood of damage or loss. This definition can be extended to include the impact of damage or loss. In these terms, the risk is a function of two separate components, the likelihood that an unwanted incident will occur and the impact that could result from the incident.
Risk Analysis involves identifying and assessing risks to data and the information system and network, which support it. Typical risks may include:
- Data being lost, destroyed or wiped;
- Data being corrupted;
- Data being disclosed without authority.
Risk Treatment
Risk Management involves identifying; selecting and adopting justified security and contingency ‘countermeasures’ to reduce risks to an acceptable level. Countermeasures may act in different ways such as:
- Reducing the likelihood of attacks or incidents occurring;
- Reducing the system’s vulnerability;
- Reducing the impact of an attack or incident should it occur;
- Detecting the occurrence of attacks or incidents;
- Facilitating recovery from an attack or incident.
PCI Readiness Assessment Service
The Cyberm Consulting team will perform a gap analysis between the relevant current information security environments at the Customer against the Payment Card Industry (PCI) Data Security Standard v1.2 (“the Standard”). The controls to be assessed fall under the following requirements:
1. Build and Maintain a Secure Network
2. Protect Cardholder Data
3. Maintain a Vulnerability Management Program
4. Implement Strong Access Control Measures
5. Regularly Monitor and Test Networks
6. Maintain an Information Security Policy