Cybersecurity Consulting

Cybersecurity Strategy and Programs

* Develop, approve, and update the overall organization Cyber Security Vision, Mission, and ensure effective communication to all concerned departments

* Lead organization Cyber Security strategy development and ensure alignment of strategy with key corporate strategies & goals of the company

* Manage alignment of related Sectors security plans * Coordinate implementation of approved strategy and security plan

* Develop and execute Security Programs to enhance business and organizational excellence and to increase the level of awareness of the Security function and its significance for the company

* Facilitate participation in Security benchmarking programs and drive improvements based on industry benchmarks

* Define and own organization’s Business Process Framework, manage its evolution and drive company-wide conformance to the framework

* Monitor the cyber security trends and technology watch to adjust corporate security vision

* Strategy development, implementation and business partnering

Read more

Cybersecurity Governance

*Manage development of all Cyber security policies, procedures, standards and guidelines.

* Privacy by Design* Develop Forensic Investigation process, procedures  Develop policy compliance process, procedures

* Develop vulnerabilities and threats guidelines, procedures and standards

* Manage the development of risk management policies, procedures & standards  Identify security weaknesses & risks, manage the development of risk management framework

* Drive cyber security awareness programs* Deep knowledge in InfoSec Frameworks (NIST 800-53, ISO27001, PCI-DSS, CSP 234, NIST CSF, APRA & Privacy, DSPF.... )

* Development of information security and privacy awareness training * Lead the establishment of and use of cybersecurity policies, standards, procedures and measurement criteria

* Develop cyber criteria for new technology

* Being in the role of trusted advisor in defining, designing and implementing cyber controls and activities.

*Partnering with corporate security and enterprise Risk and Audit teams to ensure alignment

Read more

Cybersecurity Risks and Compliance

* Compliance plans based on existing and future security services

* Monitor compliance of developed security policies and procedures (privacy, confidentiality, availability and integrity)

* Report to the management of security compliance status

* Create compliance awareness with security owners

* Collaborate with other departments to direct compliance issues to appropriate existing channels for investigation and resolution

* Conduct vulnerability & threat assessment on entire organization Systems and applications

* Handle effective management of all organization systems compliance risk

* Lead tracking and reporting of security compliance and coordinate potential Legal escalation

* Proactively raise the need to influence security decisions that place further compliance requirements on organization

* Ensure continuous and effective monitoring of security risk areas

* Lead periodic security risk assessment and manage implementation of mitigation plans concerning information security when needed

* Enterprise Risk Management, if required

* Skilled consultants in information security threats, mitigations and controls

Read more

Security Monitoring and Threats Management

* Monitor real-time security logs and systems, and monitor networks and infrastructures security

* Provide an early warning when security problems occur * Perform analysis and Security Incidents Handling

* Oversee day-to-day security operations, people, tools, processes, and measurement methods needed to achieve SOC objectives

* Operate Security Monitoring systems & tools

* Develop security monitoring process, procedures and health checks * Intrusion analytics

* AWS & Azure clouds

Read more

Data Science Consulting

Learn more about what we do

AI Project Phases

Project set up tasks

Project requirements

Proof of concept scenario

Expect delivery time

Time management

Project support

Test Environment

Production environment

Development environment

Postproduction

Designing a prototype

Monitoring and controlling

Documentations of the project

Setting priorities of the project tasks

Following best practices

Unexpected issues

UAT phase


Data analysis is schematized as a process chain consisting of the following sequence of stages:

• Problem definition

• Data extraction

• Data preparation - Data cleaning

• Data preparation - Data
transformation

• Data exploration and visualization

• Predictive modelling

• Model validation/test

• Deploy - Visualization and
interpretation of results

• Deploy - Deployment of the solution

Read more

Services

* Wrangling & Munging

* Exploratory Data Analysis

* Supervised learning

* Unsupervised learning

* Reinforcement learning

* Deep Learning

* Data pipeline 

* NLP

* Image processing

* Algorithm design

* Predictive analytics and statistical modelling

* Carry out pre-processing of
structured and unstructured data

* Analyze large amounts of information to find patterns and solutions

* POC using cutting-edge ML  for predictive modelling

* AWS, Cloudera and Google cloud, MS Azure

* Database query languages like SQL, Hive, Pig

* Data visualization

* Deployment

* Business acumen

* Programming: Python, R, C# & SQL

Read more