Threat Landscape Assessment
Current cyber threat intelligence is gathered specifically for your organisation’s industry (finance, banking, healthcare energy, transportation, technology etc.) and provided to you.
We update the risk register with these threats and map to your existing controls to identify and fill any potential gaps in your current defences.
Risk Management Maturity Assessment
A review of the information security management system (ISMS) and its applicability for effectiveness against your threat landscape is assessed.
Controls implemented in your people, process, and technology are evaluated to ensure they meet or exceed ENISA-established best practices and your specific cyber security threats to identify vulnerabilities which should be remediated.
A review and assessment of your security controls within your: People, Processes and Technology.

You’ll receive a benchmark of the maturity of your ISMS and provide a roadmap for improvement.
Incident Response Team Maturity Assessment
The maturity and effectiveness of your organisation’s current Computer Security Incident Response Team (CSIRT) capability are reviewed.
The review includes your Team’s skillset and tools to ensure that current plans and step-by-step procedures meet or exceed ENISA-established best practices, and that appropriate escalation and notification processes are up-to-date and applicable to local requirements.
You’ll receive a benchmark of the maturity of your CSIRT practices & procedures with a roadmap for continuous improvement.
Supply Chain Risk Management Maturity Assessment
Your organisation’s supply chain cyber security risk management policies, plans and procedures and their applicability and effectiveness against the cyber threat landscape in your industry are assessed and reviewed.
A review of your current cyber security controls is conducted to ensure they meet or exceed ENISA-established best practices and the specific cyber security threats facing your supply chain.
A benchmarked report will show the maturity of your supply chain cyber security risk management practices and procedures, providing a roadmap for continuous improvement.
You’ll receive a maturity report documenting your supply chain cyber security risk management practices and procedures and a roadmap for continuous improvement.