Cybersecurity Consulting
Cybersecurity Strategy and Programs
* Develop, approve, and update the overall organization Cyber Security Vision, Mission, and ensure effective communication to all concerned departments
* Lead organization Cyber Security strategy development and ensure alignment of strategy with key corporate strategies & goals of the company
* Manage alignment of related Sectors security plans * Coordinate implementation of approved strategy and security plan
* Develop and execute Security Programs to enhance business and organizational excellence and to increase the level of awareness of the Security function and its significance for the company
* Facilitate participation in Security benchmarking programs and drive improvements based on industry benchmarks
* Define and own organization’s Business Process Framework, manage its evolution and drive company-wide conformance to the framework
* Monitor the cyber security trends and technology watch to adjust corporate security vision
* Strategy development, implementation and business partnering
Cybersecurity Governance
*Manage development of all Cyber security policies, procedures, standards and guidelines.
* Privacy by Design* Develop Forensic Investigation process, procedures Develop policy compliance process, procedures
* Develop vulnerabilities and threats guidelines, procedures and standards
* Manage the development of risk management policies, procedures & standards Identify security weaknesses & risks, manage the development of risk management framework
* Drive cyber security awareness programs* Deep knowledge in InfoSec Frameworks (NIST 800-53, ISO27001, PCI-DSS, CSP 234, NIST CSF, APRA & Privacy, DSPF.... )
* Development of information security and privacy awareness training * Lead the establishment of and use of cybersecurity policies, standards, procedures and measurement criteria
* Develop cyber criteria for new technology
* Being in the role of trusted advisor in defining, designing and implementing cyber controls and activities.
*Partnering with corporate security and enterprise Risk and Audit teams to ensure alignment
Cybersecurity Risks and Compliance
* Compliance plans based on existing and future security services
* Monitor compliance of developed security policies and procedures (privacy, confidentiality, availability and integrity)
* Report to the management of security compliance status
* Create compliance awareness with security owners
* Collaborate with other departments to direct compliance issues to appropriate existing channels for investigation and
resolution
* Conduct vulnerability & threat assessment on entire organization Systems and applications
* Handle effective management of all organization systems compliance risk
* Lead tracking and reporting of security compliance and coordinate potential Legal escalation
* Proactively raise the need to influence security decisions that place further compliance requirements on organization
* Ensure continuous and effective monitoring of security risk areas
* Lead periodic security risk assessment and manage implementation of mitigation plans concerning information security
when needed
* Enterprise Risk Management, if required
* Skilled consultants in information security threats, mitigations and controls
Security Monitoring and Threats Management
* Monitor real-time security logs and systems, and monitor networks and infrastructures security
* Provide an early warning when security problems occur * Perform analysis and Security Incidents Handling
* Oversee day-to-day security operations, people, tools, processes, and measurement methods needed to achieve SOC
objectives
* Operate Security Monitoring systems & tools
* Develop security monitoring process, procedures and health checks * Intrusion analytics
* AWS & Azure clouds
Data Science Consulting
Learn more about what we do
AI Project Phases
Project set up tasks
Project requirements
Proof of concept scenario
Expect delivery time
Time management
Project support
Test Environment
Production environment
Development environment
Postproduction
Designing a prototype
Monitoring and controlling
Documentations of the project
Setting priorities of the project tasks
Following best practices
Unexpected issues
UAT phase
Data analysis is schematized as a process chain consisting of the
following sequence of stages:
• Problem definition
• Data extraction
• Data preparation - Data cleaning
• Data preparation - Data
transformation
• Data exploration and visualization
• Predictive modelling
• Model validation/test
• Deploy - Visualization and
interpretation of results
• Deploy - Deployment of the solution
Services
* Wrangling & Munging
* Exploratory Data Analysis
* Supervised learning
* Unsupervised learning
* Reinforcement learning
* Deep Learning
* Data pipeline
* NLP
* Image processing
* Algorithm design
* Predictive analytics and statistical modelling
* Carry out pre-processing of
structured and
unstructured data
* Analyze large amounts of information to find
patterns and solutions
* POC using cutting-edge ML for predictive
modelling
* AWS, Cloudera and Google cloud, MS Azure
* Database query languages like SQL, Hive, Pig
* Data visualization
* Deployment
* Business acumen
* Programming: Python, R, C# & SQL