• Penetration testing
  • Secure source code review
  • Security training and awareness
  • Cyber forensic investigation and remediation
  • Threat monitoring & management
  • Anti-phishing & anti malware monitoring

  • Third party risk management
  • Datacentre and DR reviews
  • Information lifecycle management
  • Incident analysis & response
  • Software compliance reviews
  • Mobile data management (MDM)

  • ISO 27001 certification assistance
  • Enterprise – IT based GRC
  • IT security policy & procedure framework design
  • IT control and implementation review
  • Regulatory compliances like GDPR