Identify and recognise risk across your organisation’s people, processes and technology
A comprehensive audit can help you to check that your information security controls are operational and effective, and build a roadmap for improvements to strengthen your security posture. Undertaking a review will provide your organisation with an independent third-party assessment of your current state and our experts are there to help you develop a strategy to increased maturity in the future.
The following areas are included within the assessment:
- Security controls
- Key cyber assets
- Business continuity
- Responsibilities and roles
- Incident management
- Staff awareness and current training
- Risk register
- Policies
- Cyber risk governance
- Any contractual, legal or regulatory obligation
The technical areas
- How you monitor security
- Your access controls
- Perimeter controls – firewalls, IDS, IPS Proxy
- What anti-malware is in place
- An overview of user privileges
- We review IT core infrastructure devices and sample endpoints
- Data classification
- Mobile Device Management (MDM), Multi-Factor Authenticator (MFA), and mobile working
The physical areas
-
How safe your perimeter is
-
Designated secure areas
- The physical security of your IT systems
- Any third party access or policies
Reporting on your cyber security review
Cognisys presents its findings in a comprehensive yet simple report format.
This typically comprises of:
- An executive summary
- Methodology
- Technical findings
- Prioritised recommendations for remediation
Let’s make things happen
Fill in the form and one of our team will be in touch for a no-obligation discussion or quote regarding your requirements.
info@cognisys.co.uk
Leeds office
5 Park Place
Leeds
LS1 2RU
info@cognisys.co.uk
London office
131 Finsbury Pavement
London
EC2A 1NT