Foundational Cyber Security
Focusing on cyber security solutions and services that deliver effective protection allowing you to focus on your core business.
Identify
Fundamental to mature cyber defence capability is the identification of key business assets that enable the business to achieve its business objectives
The identification of threats to these assets enables the business to orientate their defences to protect them
Protect
Strategic allocation of defences that enable the business to mitigate current and evolving threats, provides greatest return on investment to business.
Effective protection of information assets provides the assurance that information management systems continue to be fit for purpose.
Detect
Assurance that information management systems continue to operate as approved for business purposes is pivotal for agile and responsive cyber defence capability.
Regular assessment of an organisations ability to determine if their systems are compromised is important so that action can be taken if needed.
Respond
Non performing business capabilities cost the business during downtime, returning to nominal performance is essential to business continuity.
The speed and effectiveness of an organisations response to a breach is pertinent in reducing the scope and level of the consequences.
Recover
An effective incident response plan allows the timely Restoration of critical systems after a cyber incursion.
The 6 key stages of an effective response to a cyber incident are Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned