Warning: count(): Parameter must be an array or an object that implements Countable in /homepages/4/d665721493/htdocs/clickandbuilds/StydeConsulting/wp-includes/post-template.php on line 317

CYBER SECURITY SOLUTIONS

CYBER SECURITY SOLUTIONS

  1. DIGITAL TRANSFORMATION: Secure Migration to Cloud
  2. DSDM
  3. LEAN SIX SIGMA: Green, Black and Master Black Belt service
  4. PORTFOLIO MANAGEMENT
  5. PROGRAMME MANAGEMENT
  6. PROJECT MANAGEMENT
  7. SCALED AGILE SAFE® 4.5
  8. SOFTWARE DEVELOPMENT
  9. Agile
  10. DevOps
  11. Extreme Programming

IMPLEMENTATION & ASSESSMENT

  1. COBIT 5
  2. CMMI
  3. COSO
  4. FAIR
  5. ITIL
  6. TQM
  1.  BESPOKE IN-HOUSE INFORMATION SECURITY TRAINING
  2. OUT-HOUSE CYBERSECURITY TRAINING (with certification)
  1.  DIGITAL TRANSFORMATION AS A SERVICE: Migration to Cloud
  2. DPO as a service
  3. MSSP (Managed Security Service Provider)
  4. Virtual CIO
  5. Virtual CISO
  1. GDPR
  2. Data Discovery: Structured & Unstructured (Digital, Physical)
  3. Data Flow Mapping, Management & Minimization
  4. Data Protection Impact Assessment (DPIA) & Gap Analysis
  5. FINANCE
  6. Basel II/III
  7. PCI-DSS
  8. Solvency
  9. SOX (404)
  10. ISO STANDARDS
  11. ISO 9001
  12. ISO 14001
  13. ISO 17025
  14. ISO 20000
  15. ISO 22301
  16. ISO 27001
  17. ISO 31000
  18. NORTH AMERICAN STANDARDS
  19. HIPAA
  20. NIST 800-37
  21. NIST 800-171
  • ARCHITECTURE
  • CLOUD ARCHITECTURE
  • Azure
  • AWS
  • Google Cloud
  • ENTERPRISE ARCHITECTURE
  • PEAF
  • TOGAF
  • Zachman
  • SECURITY ARCHITECTURE
  • HMG Security Policy Framework
  • JSP (440)
  • MODAF
  • NAF
  • SABSA
  • SOACP (Service Oriented Architecture)
  •  
  • SYSTEMS ENGINEERING
  • AIM
  • GDS Government Digital Service Identity Assurance
  • Privileged Access Management
  • CLOUD SECURITY
  • Cloud Access Security Broker (CASB)
  • Federated Identity
  •  
  • DATA
  • Cryptography
  • Data Protection
  • Data Lifecycle Management
  • Physical and virtual data destruction
  •  
  • NETWORK & SYSTEMS DESIGN
  • Trusted Computing Interface
  • Secure System Building
  • Baseline configuration
  •  
  • DEFENCE-IN-DEPTH
  • Personnel Security (including Insider Threats)
  • Physical Security
  •  

 PENETRATION TESTING:

  • Application & Infrastructure
  • Red Team (Independent Assessment)
  • Blue Team (Recruitment)
  •  
  • SOURCE CODE SCANNING
  • Black Box
  • White Box
  •  
  • THREAT MODELING
  • Attack Trees
  • DREAD
  • OWASP Top 10
  • SANS Institute – CIS Critical Security Controls
  •  
  • VULNERABILITY:
  • Analysis, Training and Awareness
  • Vulnerability scanning
  • Social Engineering
  • ADVANCED PERSISTENT THREATS
  • BUSINESS CONTINUITY: Strategy and Assistance

DISASTER RECOVERY: Strategy and Assistance

  • DATA LOSS PREVENTION
  • INCIDENT Investigation
  • Forensics (EnCase)
  • Professional Interviewing, Incident Analysis and Reporting
  •  
  • MALWARE REVERSE ENGINEERING
  • SIEM (Security Information and Event Management) (ArcSight/Splunk)
  • Breach Notification
  • Data Leakage Discovery
  • Event Detection
  • Incident Containment
  • Incident Response
  • Infrastructure Protection
  • Threat Mitigation
  • SOC (Security Operations Center): Design & Management
  •  
  • THREAT INTELLIGENCE