We have a quick chat to understand the type of review you need. We gauge together the scope, where we address the architecture, attack surface and business critical assets involved. We articulate how you gain value from this gap analysis
Planning
Step 2
We decide together on logistics, work span and time tables
Kickoff
Step 3
We have a kickoff meeting where we finalise timelines, participants and prerequisites for success
Review
Step 4
We undertake the review based on systems, processes, interviews and tools used
Reporting
Step 5
We compile a report addressing recommended framework and security posture, risk rating, common practices and proposed remedies based on levels of criticality
Executive report
Step 6
We include an executive report that explains the necessity for recommended action
Ongoing support
Step 7
Once completed, we will still be here to advise and guide you through implementation of any remedies