We offer security consulting in the Cyber and Information security arena, with the highest levels of security principles – Confidentiality, Integrity and Availability (CIA).
Our services include the following:
- Architecture review and standard
- Application security reviews
- Due diligence and security risk assessment
- Security assurance
- Security policies and standards
- Security awareness
- Payment Card Industry – Data Security Standard (PCI-DSS and PA-DSS) readiness
- International Organization for Standardization (ISO) 27001 & 27002 readiness
Our associates have the industry recognized security certifications and experience in administering the above in Ghana, Africa and United States of America supporting banks, financial institutions and industry..
Security Awareness Training
The 2 day workshop covers a number of important information security threats. The course trains participants regarding threats on email and messaging, internet browsing, social networks, mobile device security, passwords, data destruction, insider threat and hacking. The participants will learn how to apply security best practices to securing work equipment, telephone communication, exchanging information securely, security awareness when travelling and protecting information on the internet. The course is geared towards all employees of an organization.
Information Security Responsibilities, Principles and Policies
The learning objectives focuses on overview of information security, information security responsibilities, data classification and handling, asset and data ownership and the information lifecycle. The workshop is directed towards information security, audit, internal control and risk related units’ professionals. This is a 2 day workshop
Executive Training on Cyber Security Trends
The 3 day executive training on cyber security brings to light cyber security breaches and incidents trends and the role of executive management to demonstrate ownership on information assets and required controls. It will demonstrate the importance of management to emphasize the need for security. Application development security controls will be a focus with introduction to high-level secure software development lifecycle.