What we seek to accomplish together:
- and development of security framework, information security policies, processes / procedures and guidelines on an ongoing basis.
- compliance with these policies / procedures through ongoing security reviews and audits, not limited to log analysis and security assessment of customer ICT systems
- conduct security risk management exercise
- manage vulnerability assessment
- conduct information security awareness training
- for the development and management of customer’s security response plan. To lead and support customer in the matters of security incident resolution and response.
- of contact to assist and advise customer for ICT security related matters