Security Consultancy

Cyber Security Lifecycle covers end to end security in locally hosted, near and off-shore locations and cloud deployments, and includes but is not limited to; 

Threat assessment – understanding who or what is a danger to your organisation and its assets

Risk identification, assessment and management – identifying the risks that the threats pose, assessing how they may affect the organisation and treating those risks so the impact is reduced or mitigated.

Compliance – Ensuring that what you are looking to implement or the service you are providing is in line with security best practice and legal statute, such as the Data Protection Act 1998.

Security design & architecture review – Either the production and design of a security architecture with appropriate documentation or the review of an existing design.

ITHC scope, implementation and risk treatment review – The engagement of ITHC consultants and the production and design of an appropriate scoping document, with the management and production of a risk treatment plan once the testing is complete.

Security policy production – In accordance with the organisations requirements and in line with security best practice, including ISO27001, an ISMS (Information Security Management System) document set can be produced to underpin the operational security of the organisation.

Ongoing project consultation on a requirements basis – The provision of ad-hoc, as required, consultancy services to support the organisation through project and BAU activities.

 

By engaging RBC-GROUP, you can be assured that you are being given the best advice from consultants who are experienced in securing key business systems used in large commercial organisations and high profile central government departments.

 

To facilitate the Cyber Security Lifecycle service, an initial consultation is required to ensure that RBC-Group can provide a valued and quality service and to estimate the days required to complete the assignment.