top of page
Threat Assessment and Risk Analysis

The most imortant steps in approaching Cyber Security is to understand, what:


  • is to be protected

  • are the threats and

  • is the risk associated with these threats


This is a process that is performed largely by the customer but the facilitation of the process by an experienced cyber security consultant is invaluable.


Our consultants will work with your cyber security stakeholder to ensure that a thorough analysis of threats and risks is achieved.

Policy Formulation & Implementation

Once Threat Assessment and Risk Analysis is done, the next step is to answer:


  • What should be done to mitigate the threat, and

  • What strategy is needed to achieve this mitigation?


A Security Policy document embodies all the policies, operational processes and technology elements that need to be put in place in order to mitigate threats identifies. As the phrase „Rome wasn’t built in a day“ goes, cyber defence approaches do not happen overnight. A clear strategy of further analysis and implementation is needed.


As with the previous step, our consultants will work with your cyber security stakeholders to help formulate the implementation strategy that is right for your needs.

Tools & Process Development

Active Cyber threats number above 10,000 depending on how you count mutations and variations. Regardless of how they are counted, the order of magnitude shows that it can become an unmanageable task unless the right tools and processes are put in place to manage them.


We can assist, advise and setup if required, your cyber centre’s initial tool-chain, automation and work-flow processes that will allow your team to manage the daily tasks of vetting and deploying cyber defence measures without becoming distracted by the scale and administration of the task itself.


If desirable we can advise and assist with the ongoing evolution and update of your centre’s tool-chain and processes.

TechTeam Development

There are several steps to defending against a cyber threat including


  • initial threat identification,

  • counter-measure analysis and development

  • counter-measure offline testing

  • counter-measure rollback planning

  • counter-measure online deployment

  • counter-measure efficacy monitoring


Depending on how much of these steps will be performed in your centre you may wish to buildup up you own technical team to perform some or all of these steps.


We offer TechTeam build-up training and support to bootstrap your team from their current capabilities stand-point and can support them on an ongoing basis if desired.

Technical Auditing

Technical Auditing checks the current state of an implementation Cyber Defence solution. It is mostly used to test if the implementation meets the desired objectives of the solution. It is mostly used to ensure that a project was implemented according to plan but is often used at the start of a project to check is is currently available and what is the state of existing components, solutions or infrastructure.


We offer our technical expertise to audit your systems, solutions and infrastructure to ensure your project is where is needs to be or to form a well-defined starting point to a new project. It is also advisable to perform technical audits on an ongoing basis to ensure the efficacy of processes put in place to maintain an effective state of your project.

Product & Solution Assessment and Evaluation

There are many competing vendors, products and solutions in any market and even more so in the Cyber Defence market. Choosing the right solution from among all the offerings can be a laborious and daunting task.


We can assist in this selection process agreeing a set of well-defined requirements and other ancillary parameters for your projects and the undertaking with you, an assessment and selection process. This process may include:


  • demonstrations,

  • proof-of-concept trials,

  • bake-offs to select from among peer solutions

  • visiting vendor facilities to ensure the appropriate capabilities

  • definition of additional interfacing or integrations necessary to meet the specifications


We offer to perform as much of this process as you desire and to work with you to arrive at the best solution for you.

bottom of page