PLAN - Consulting

Cyber Security

With extensive experience in cyber security, we can help improve your cyber security posture through the development of risk management frameworks, policies, standard and incident response plans.

Cybersecurity Policy Development:

  1. Objective Definition: We help define your organisation's cybersecurity objectives and desired security posture.
  2. Compliance Review: We identify relevant legal, regulatory, and industry compliance requirements.
  3. Stakeholder Engagement: Our consultants involve key stakeholders, including IT, legal, HR, and management.
  4. Risk Assessment: We can undertake a thorough risk assessment to identify potential threats and vulnerabilities.
  5. Policy Framework: We develop a high-level cybersecurity policy framework with overarching principles.

Cybersecurity Standard Development:

  1. Control Specification: Our consultants can create detailed security standards outlining specific controls and requirements.
  2. Technical Measures: We define technical and operational security measures, e.g., encryption standards, access controls.

Threat Risk Assessment:

  1. Risk Identification: Our consultantsi dentify and categorise potential threats and vulnerabilities.
  2. Risk Analysis: We analyse the likelihood and impact of identified risks.
  3. Risk Mitigation: We develop strategies and controls to mitigate or manage identified risks.

Incident Response Planning:

  1. Incident Classification: Our consultants define incident types and severity levels.
  2. Response Team Formation: We establish an incident response team with clearly defined roles and responsibilities.
  3. Incident Detection: We specify methods for detecting security incidents in real-time.
  4. Incident Reporting: Our consultants establish procedures for reporting incidents to relevant authorities and stakeholders.
  5. Response Plan Development: Our consultants create detailed incident response plans, including containment, eradication, and recovery steps.
  6. Testing and Training: We conduct regular incident response drills and provide training to response team members.
  7. Documentation: We document incident response plans, findings, and actions taken for post-incident analysis.

More services

View all services

ICT Enterprise and Solutions Architecture

Enterprise architecture is a strategic framework that aligns your business objectives with your technology capabilities, enabling solutions that work.

IT and Cloud Engineers

Our IT and Cloud Engineers maintain your on premise and cloud infrastructure including cloud architecture and migration.

Project Officer/Support

Project Officers are responsible for a range of crucial tasks that contribute to the successful planning, execution, and completion of projects.

Vendor, Procurement and Contract Management

Our consultants assess ICT procurement needs, negotiate contracts, and manage off-kilter vendor relationships to ensure things get back on track.

ICT Enterprise and Solutions Architecture

Enterprise architecture is a strategic framework that aligns your business objectives with your technology capabilities, enabling solutions that work.