PLAN - Consulting

Cyber Security

With extensive experience in cyber security, we can help improve your cyber security posture through the development of risk management frameworks, policies, standard and incident response plans.

Cybersecurity Policy Development:

  1. Objective Definition: We help define your organisation's cybersecurity objectives and desired security posture.
  2. Compliance Review: We identify relevant legal, regulatory, and industry compliance requirements.
  3. Stakeholder Engagement: Our consultants involve key stakeholders, including IT, legal, HR, and management.
  4. Risk Assessment: We can undertake a thorough risk assessment to identify potential threats and vulnerabilities.
  5. Policy Framework: We develop a high-level cybersecurity policy framework with overarching principles.

Cybersecurity Standard Development:

  1. Control Specification: Our consultants can create detailed security standards outlining specific controls and requirements.
  2. Technical Measures: We define technical and operational security measures, e.g., encryption standards, access controls.

Threat Risk Assessment:

  1. Risk Identification: Our consultantsi dentify and categorise potential threats and vulnerabilities.
  2. Risk Analysis: We analyse the likelihood and impact of identified risks.
  3. Risk Mitigation: We develop strategies and controls to mitigate or manage identified risks.

Incident Response Planning:

  1. Incident Classification: Our consultants define incident types and severity levels.
  2. Response Team Formation: We establish an incident response team with clearly defined roles and responsibilities.
  3. Incident Detection: We specify methods for detecting security incidents in real-time.
  4. Incident Reporting: Our consultants establish procedures for reporting incidents to relevant authorities and stakeholders.
  5. Response Plan Development: Our consultants create detailed incident response plans, including containment, eradication, and recovery steps.
  6. Testing and Training: We conduct regular incident response drills and provide training to response team members.
  7. Documentation: We document incident response plans, findings, and actions taken for post-incident analysis.

More services

View all services

Content Management Specialists

Need to refresh your internet/intranet or any other corporate content? We have skilled content managers and editors that can turn their hand to any tasks.

Business Analysis

Our Business Analysis focus primarily on gathering and documenting your requirements, understanding your current state, and assessing the feasibility and potential impacts of the proposed change.

Operating Model Development

Is your ICT function not functioning well? We can help re-baseline ICT delivery by developing an operating model that is fit-for-purpose for your organisation.

Project Officer/Support

Project Officers are responsible for a range of crucial tasks that contribute to the successful planning, execution, and completion of projects.

ICT Enterprise and Solutions Architecture

Enterprise architecture is a strategic framework that aligns your business objectives with your technology capabilities, enabling solutions that work.