free web maker

ISO/IEC 27001:2013

INFORMATION TECHNOLOGY -- SECURITY TECHNIQUES -- INFORMATION SECURITY MANAGEMENT SYSTEMS

ISO/IEC 27001:2013 specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. It also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in ISO/IEC 27001:2013 are generic and are intended to be applicable to all organizations, regardless of type, size or nature.

ISO 27001 Implementation Consulting including Information Security Risk Assessment, Internal Audits, Development of Policy and all other documents related to ISO

ISO 22301:2012

SOCIETAL SECURITY -- BUSINESS CONTINUITY MANAGEMENT SYSTEMS

ISO 22301:2012 specifies requirements to plan, establish, implement, operate, monitor, review, maintain and continually improve a documented management system to protect against, reduce the likelihood of occurrence, prepare for, respond to, and recover from disruptive incidents when they arise.

The requirements specified in ISO 22301:2012 are generic and intended to be applicable to all organizations, or parts thereof, regardless of type, size and nature of the organization. The extent of application of these requirements depends on the organization's operating environment and complexity.

PCI DSS

Our chosen information security standard is PCI-DSS. It is an effort to reduce card data compromises and electronic data loss. Despite its humble beginnings, PCI DSS has come a long way, and it is progressing.

Besides the fact that its easy to comply with the PCI security standards, it gives Peace of Mind that your organization has done everything it can to ensure the safety and security of customers’ payment card data.

PCI-DSS implementation leads to an in-depth defense, instigating security at every level in a domain of an organization. It’s direct and indirect advantage would not only enhance customer trust but also save your image and reputation.

GDPR

The General Data Protection Regulation (EU) 2016/679 (GDPR) is a regulation in EU law on data protection and privacy for all individual citizens of the European Union (EU) and the European Economic Area (EEA). It also addresses the transfer of personal data outside the EU and EEA areas. The GDPR aims primarily to give control to individuals over their personal data and to simplify the regulatory environment for international business by unifying the regulation within the EU. It is a legal framework that sets guidelines for the collection and processing of personal information from individuals who live in the European Union (EU).

Gap Analysis, PII Identification, DPO Services, Security Health Check
Data Protection and Impact Analysis (DPIA), Policy Review

Vulnerability Assessment

Vulnerability scans see the threat levels in your network and learn how to fix them. For more advanced threat levels, GTIS will assist you in re-mediating those threats in the most effective way possible. It assists to defend your network against the latest threats. Identifying the vulnerabilities helps to rank and analyze the risk associated. These scans of network inventory gives insight of environment and prioritize recommendations for each detected vulnerability. Identification benefits the preparation of your network against the latest threats.

In-depth testing of IT infrastructure leads to understanding of the effectiveness of security systems in place
Testing the ability of network defenders to successfully detect and respond to the attacks
Enables planned investment to secure the IT setup resulting in better ROI
Helps to identify the security gaps and secure them
Focus and prioritise high-risk and threats rather than false encounters
Optional Software Assessment to understand the vulnerabilities within
Process and policy in place helps to run regular and periodic tests
Assessing the magnitude of potential business and operational impacts of successful attacks

Penetration Testing

A penetration test, or pen test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. It is useful in validating the efficacy of defensive mechanisms, as well as, end-user adherence to security policies. They are carried out employing the same techniques as an attacker located outside your infrastructure and verify (without revealing too much information on your environment) -
If servers or applications will withstand attack?
If the identified vulnerabilities can lead to further intrusion and exploitation?
Intrusion tests enables to understand your current security architecture, and provide you with recommendations on how to improve your defense against technological vulnerabilities that can lead to intrusions, fraud and service interruptions.

Application Penetration Testing
- Cloud testing
- Web App
- Mobile App
- Internal and external

Network Penetration Testing

SOC1

A SOC 1 Report (System and Organization Controls Report) is a report on Controls at a Service Organization which are relevant to user entities’ internal control over financial reporting. The SOC1Report is what you would have previously considered to be the standard SAS70 (or SSAE 16), complete with a Type I and Type II reports, but falls under the SSAE 18 guidance (as of May 1, 2017).

A SOC 1 report provides user entities of the payroll processing company reasonable assurance that the internal controls of the payroll processing company are suitably designed (Type I report) or suitably designed and operating effectively (Type II report).

There are numerous service organizations that may receive SOC 1 reports. The common theme between the service organizations should be the potential impact on user entities’ internal controls over financial reporting (ICFR). Some examples of organizations who may receive SOC 1 reports include:

Payroll processors
Medical claims processors
Loan servicing companies
Data center companies
Software-as-a-Service (SaaS) companies that may impact the financials of their user entities.

SOC2

SOC 2 is an auditing procedure that ensures your service providers securely manage your data to protect the interests of your organization and the privacy of its clients. For security-conscious businesses, SOC 2 compliance is a minimal requirement when considering a SaaS provider.

SOC 2 reports are unique to each organization. In line with specific business practices, each designs its own controls to comply with one or more of the trust principles.

These internal reports provide you (along with regulators, business partners, suppliers, etc.) with important information about how your service provider manages data.

SOC 2 certification is issued by outside auditors. They assess the extent to which a vendor complies with one or more of the five trust principles based on the systems and processes in place.

SOC3

Trust Services (including WebTrust and SysTrust) are audits that were specifically designed for companies looking for independent assurance related to Information Systems and e-Commerce activities. The Assurance Services Executive Committee of the AICPA has developed \ criteria to provide guidance over reporting on the security, availability, processing integrity, privacy, and confidentiality of systems. SOC 3 reports are Trust Service examination reports. They address the same subject areas as a SOC 2 report, but, in a shortened version that can be used in a service organization’s promotional efforts and on its website. SOC 3 reports can serve as a marketing tool, with potential customers for instance, to show the organization has appropriate controls in place to mitigate risks on non-financial subject matters.

When your service organization obtains a SOC 3 report, it enhances the confidence among sellers and buyers alike. These customers and stakeholders gain confidence and place trust in your organization and its systems. This document allows you to reduce risk and provide assurance to the management and boards that need confirmation. The SOC 3 also provides a competitive advantage by giving your company independent verification by trusted professionals.

ISO 55001:2014

ASSET MANAGEMENT -- MANAGEMENT SYSTEMS

ISO 55001:2014 specifies requirements for an asset management system within the context of the organization.

ISO 55001:2014 can be applied to all types of assets and by all types and sizes of organizations.

ISO 9001:2015

QUALITY MANAGEMENT SYSTEMS

ISO 9001:2015 specifies requirements for a quality management system when an organization needs to demonstrate its ability to consistently provide products and services that meet customer and applicable statutory and regulatory requirements, and aims to enhance customer satisfaction through the effective application of the system, including processes for improvement of the system and the assurance of conformity to customer and applicable statutory and regulatory requirements.

All the requirements of ISO 9001:2015 are generic and are intended to be applicable to any organization, regardless of its type or size, or the products and services it provides.