Cyber Security Governance & Strategy:

Help your organization to have the right cyber security strategy and governance structure in place to enable and support business initiative and services.

Policies and Procedures:

Review the design and effectives of existing policies, procedures, and standards against well recognized local and international security standards and best practices such as ISO27k, NIST and NESA.  

Risk Assessment:

Understanding the current security posture of your organization across the people, process, and technology domains and consequently identify the best control options available to close those gaps.  

 

 

Compliance Assessment: 

Identify compliance requirements that are applicable to your organization and help you identify and address compliance gaps.    

Access Control Assessment: 

Review and assess the design and effectiveness of established controls and processes to provision access, assign access privileges, and monitor access to your system and information. 

 

 


 
 

Copyright © 2017 Ingram Micro Cyber Security META. All rights reserved.