Cyber Security Services

  • Information & Cyber Security Services

banner
banner
banner
banner
banner
banner
Governance

GOVERNANCE

Program Management and Policy

  • Information Security policy documentation, management and governance processes
  • Program management, governance board facilitation
  • Metrics development and reporting
ISO27000 Certifications

ISO27000 CERTIFICATIONS

Implementation and maintenance services:

  • ISO27001 Information Security Management Systems
  • ISO27017 Cloud Service Provider Certifications
  • ISO27701 Privacy and Personally Identifiable Information Protection
Cloud Security

CLOUD SECURITY

Security architecture, assessments, identity and access management, configuration management, monitoring, logging, and other security advisory services for:

  • Amazon Web Services (AWS)
  • Google Cloud
  • Microsoft Azure
Identity and Access

IDENTITY & ACCESS

Identity & Access Management & Privileged Access

  • Identity and Access Management program implementation
  • Identity and Access Management architecture services
  • Privileged Access Management (PAM) advisory servicest
Awareness

AWARENESS

Security Awareness and Training programs

  • Security Awareness program design and implementation
  • Phishing campaign management
  • Communications management
Business Continuity and Disaster Recovery programs

BCP / DR

Business Continuity and Disaster Recovery programs

  • Business Impact Analysis (BIA) facilitation
  • Enterprise Business Continuity planning, documentation, training and testing
  • Disaster Recovery planning, documentation and testing
Incident Response Planning, Support and Testing

INCIDENT RESPONSE

Incident Response Planning, Support and Testing

  • Incident Response planning and documentation
  • Incident Response plan testing and training
  • Response assistance and forensics advisory services
Vulnerability Management

VULNERABILITY MANAGEMENT

Vulnerability Management programs

  • Vulnerability Management program implementation services
  • High-value asset inventory management and assessment
Penetration Testing services

PENETRATION TESTING

Penetration Testing services

  • Black box and white box penetration testing
  • Web and mobile app assessments
  • SDLC secure process assessments and advisory services
Security Assessments

ASSESSMENT & STRATEGY

Security Assessments & Strategy Advisory services

  • Information Security program assessments, executive reporting, and baselining services
  • Short and long term strategy advisory services
  • Information Security program business alignment and resourcing
Risk Assessment

RISK MANAGEMENT

Risk Assessment & Management ISO27005

  • Risk Management program implementation
  • ISO27005 consulting
  • Risk assessment facilitation
v CISO

v CISO

Virtual CISO / Information Security Management services

  • Start-up vCISO services
  • Information Security program management
  • ​C-Level / Board advisory and support services

ekko Agility

Confluence and Jira templates, workflows to support information security programs, ISO27001, ISO27701, NIST CSF, Cyber Essentials and more...

Request a Demo
about
about