Cyber Security: 5-Day Assessment
BUI (Pty) Ltd
The BUI team have in-depth knowledge and experience across several next generation solutions that are redefining the way that the world looks at information security.
The BUI team have in-depth knowledge and experience across several next generation solutions that are redefining the way that the world looks at information security.
Is Your Business Challenged Around Cyber Security and Identity Management?
Success starts with security. Choosing the right security partner should never carry the same stress as having to deal with a security breach.
The most effective way to protect against exposure to vulnerabilities is to develop intelligence around your assets via assessment and to harden these systems to minimise your attack landscape.
The BUI team have in-depth knowledge and experience across several next generation solutions that are redefining the way that the world looks at information security.
The assessment covers key components such as:
- Exploit mitigation
- Business Continuity / Disaster Recovery (BC/DR)
- Lateral Traversal / Securing Privileged Access
- Attack Surface Reduction of your cloud assets
Deliverables
- Multi-layered security where we ensure identity, on-premise & cloud based assets and all-important network edge is no longer a pipe dream but rather a reality.
- Information Security gap assessment and remediation roadmap development.
- Cybersecurity testing and improvement service.
- Information security training and awareness.
- Platform and Network Security Assessments, Vulnerability Scanning, Emerging Technology Risk Assessment
- Cyber Security and Risk Findings Report
Agenda
Day 1 - Data Gathering and Information
- Rapid Cyber Security Assessment Workshop
- Technical Requirement Workshop
- Environment Assessment
Day 2 - Interview Series Round 1
- NIST Cyber Security Controls 1 -10
Day 3 - Interview Series Round 2
- NIST Cyber Security Controls 11 -20
Day 4 - Benchmarking and Inventory Analysis
- Benchmarking and Inventory Analysis
Day 5 - Cybersecurity Feedback
- Cyber Security Roadmap and Critical Findings Discussion
- Final Report Presentation