our people empower your business · business resilience 17. dpoaas 18. penetration testing 19....

22
OUR PEOPLE EMPOWER YOUR BUSINESS

Upload: others

Post on 02-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: OUR PEOPLE EMPOWER YOUR BUSINESS · Business Resilience 17. DPOaaS 18. Penetration Testing 19. Audit 20. Secure Development 21. Creating a Better ... critical business function, yet

OUR PEOPLE EMPOWER YOUR BUSINESS

Page 2: OUR PEOPLE EMPOWER YOUR BUSINESS · Business Resilience 17. DPOaaS 18. Penetration Testing 19. Audit 20. Secure Development 21. Creating a Better ... critical business function, yet

12. Cyber Security 13. Data privacy14. CISOaaS15. ISO Support16. Business

Resilience17. DPOaaS18. Penetration

Testing19. Audit20. Secure

Development21. Creating a

Better Tomorrow

22. Contact

Contents3. Welcome4. About Us5. Our Mission6. Challenges we

address7. Benefits of

working with us

8. The i3Secure Difference

9. Our Approach10. Client Success11. Our Services

2

Page 3: OUR PEOPLE EMPOWER YOUR BUSINESS · Business Resilience 17. DPOaaS 18. Penetration Testing 19. Audit 20. Secure Development 21. Creating a Better ... critical business function, yet

As society becomes increasingly digitally reliant, the flow of data has

grown exponentially with data constantly being accessed and shared

globally. It has become an essential part of conducting business but is

also a considerable risk for organisations as threats and regulations

evolve.

Evolving and more stringent regulation, digital transformation, increased

competition and the need to enhance customer trust all mean that the

business landscape is being reshaped faster than ever before. This

change in landscape means businesses must evolve or face the risk of

becoming obsolete.

At the same time, cyber security and data protection have become a

critical business function, yet it remains a non-core competence for a

significant number of organisations.

At i3Secure, we use our expert knowledge of technology, governance,

and regulations to overcome business challenges, enable cost

efficiencies and drive growth.

WelcomeO U R P E O P L E E M P O W E RY O U R B U S I N E S S

3

Page 4: OUR PEOPLE EMPOWER YOUR BUSINESS · Business Resilience 17. DPOaaS 18. Penetration Testing 19. Audit 20. Secure Development 21. Creating a Better ... critical business function, yet

i3Secure is a UK-based Cyber Security and Data Protection consultancy,

focused on providing services and solutions to enable our client’s

strategies. We are a people orientated business, passionate about

working in inclusive and collaborative ways to create positive outcomes.

Our team have deep industry expertise and extensive experience, from

supporting start-ups, to leading global enterprise security programmes,

helping businesses make intelligent investments in security to unlock

opportunities. This experience is underpinned by our ability to lead,

collaborate and innovate. The insights and quality services we deliver,

help build trust and confidence with our clients, ensuring we become a

trusted partner.

We know that cyber security, data protection and compliance challenges

are different for every organisation in every industry. Utilising our

proven and pragmatic approach, we help embed tailored solutions

which provide assurance for our clients, allowing them to focus on their

core business activities.

About UsG E T TO K N O W U S

4

Page 5: OUR PEOPLE EMPOWER YOUR BUSINESS · Business Resilience 17. DPOaaS 18. Penetration Testing 19. Audit 20. Secure Development 21. Creating a Better ... critical business function, yet

O u r m i s s i o n i s t o p r o v i d e a c c e s s i b l e

l e a d i n g s e r v i c e s , t o e n a b l e o u r s t a f f,

c l i e n t s , a n d p a r t n e r s t o a c h i e v e m o r e .

Our Files do not have a number but a face

Respect

Integrity

Excellence

Innovative

Ingenuity

Collaborative

Our values are at the centre of everything we do and

ensure that we create an inclusive and collaborative

working environment to deliver accessible, secure,

and sustainable services every time.

O u r Va l u e s

55

Page 6: OUR PEOPLE EMPOWER YOUR BUSINESS · Business Resilience 17. DPOaaS 18. Penetration Testing 19. Audit 20. Secure Development 21. Creating a Better ... critical business function, yet

We support businesses in evolving their operating models to maximisevalue from digital transformation,

automation and workforce optimisation. We ensure cyber

functions are reimaginedfor the digital age.

The business environment and market entry requirements are

becoming ever more challenging.We enable businesses who seek growth beyond core markets to operate with confidence across

jurisdictions and make the most of today’s new business opportunities.

We help navigate the complexities of regulations and certification

requirements, enabling businesses to achieve their goals and unlock

opportunities whilst ensuring legal and regulatory compliance is

maintained.

REGULATIONSCOST

Challenges we addressBusinesses today face the acute challenge of increased costs, stricter regulations all whilst harnessing a digital evolution. With pressure to do

more with less, businesses are seeking new ways to modernise working practices to achieve cost efficiencies and accelerate growth. However,

it is often difficult for businesses to figure out how to begin this process, where to focus, what resources can be leveraged and what success

looks like.

Cyber has never been more important as executives continue to face mounting pressure to ensure

security and privacy along with success and profitability. Increasingly, businesses are feeling the pain of the cyber skills gap. We address this gap

and help build strong in-house capabilities.

CAPABILITYGROWTH

6

Page 7: OUR PEOPLE EMPOWER YOUR BUSINESS · Business Resilience 17. DPOaaS 18. Penetration Testing 19. Audit 20. Secure Development 21. Creating a Better ... critical business function, yet

Benefits ofworking with us

7

Unlock new opportunities

7

Gain a trusted partner, who

helps you grow

Gain assurance and provide your customers with

confidence

Scale your capabilities not your security

costs

Page 8: OUR PEOPLE EMPOWER YOUR BUSINESS · Business Resilience 17. DPOaaS 18. Penetration Testing 19. Audit 20. Secure Development 21. Creating a Better ... critical business function, yet

The i3SecureDifference

We are easy to do business with

We purposely designed our engagement processes to be uncomplicated, meaning we can get to understand your

needs quickly.

Our services enable your

business Cyber security and data

protection can be perceived as blockers. We don’t

prescribe to those thoughts. Our proven service delivery methodology is designed to enable organisational goals

and objectives.

Innovative

We bring new thinking, creative approaches, domain

knowledge and insight to help develop your

capabilities.

Enduring value

No matter the length of the engagement, we create

enduring value.

A perceptive partner

We use our understanding of governance and

regulatory requirements to address business challenges and unlock opportunities.

Culture

We are a people orientated business, passionate about

working in inclusive and collaborative ways.

8

Page 9: OUR PEOPLE EMPOWER YOUR BUSINESS · Business Resilience 17. DPOaaS 18. Penetration Testing 19. Audit 20. Secure Development 21. Creating a Better ... critical business function, yet

We understand that cyber security and data protection cannot be considered in

isolation and must be integrated into business activities to ensure they enable, not

frustrate organisational objectives.

Our methodology is agile and is designed to integrate seamlessly into your

organisation, complementing your ongoing efforts. Whether you are looking for

on-demand support, or a long term partner, our experts can help you identify and

implement appropriate solutions.

Through our pragmatic approach, we pride ourselves on solving business problems,

whether that is achieving cost-efficiencies, unlocking opportunities, navigating

regulations or bridging the skills gap.

Our teams have a strong background in a number of verticals across various

sectors. They quickly adapt to your environment and bring with them a range of

ideas and specialist expertise to create innovative solutions to address your

challenges.

Using our bespoke engagement model, a dedicated and cost-free Engagement

Partner will support you throughout the entire project. They will work with you and

your teams to understand your requirements and define a set of deliverables to

ensure our services meet your objectives on time and within budget.

We work closely with your key stakeholders and programme teams to deliver

tailored services that meets the demands of your business processes, strategic

business objectives and regulatory requirements.

Our Approach

9

Page 10: OUR PEOPLE EMPOWER YOUR BUSINESS · Business Resilience 17. DPOaaS 18. Penetration Testing 19. Audit 20. Secure Development 21. Creating a Better ... critical business function, yet

Cyber TransformationProgramme Director for the delivery of a £150m Cyber

Transformation Programme, for a FTSE 250 enterprise. Providing

crucial assurance for the organisation’s future ways of working.

£150m budget

Data Privacy ProgrammeSuccessfully supported a software company in establishing a

innovate data privacy governance framework, leading to improved

reporting, appropriate protection of data and £100k annual savings.

£100k saving

ISO 27001 Implemented several information security management systems at

SME and enterprise level to ISO 27001 Standards. Triumphantly

leading the organisations from inception phase to ISO certification by

UKAS accredited Certification bodies in under two months.

15 Business Units

Our consultants are proud to have worked on numerous

projects supporting a broad range of stakeholders on

their journeys. We pride ourselves on our ability to

deliver valuable services to clients no matter the

complexity or maturity levels of the organisation.

H O W W E H E L P E D

ClientSuccess

10

Page 11: OUR PEOPLE EMPOWER YOUR BUSINESS · Business Resilience 17. DPOaaS 18. Penetration Testing 19. Audit 20. Secure Development 21. Creating a Better ... critical business function, yet

OurServicesOur services are based upon our core values, which ensure we join our clients

wherever they are on their journey and partner with them to create enduring value.

We have a range of skills and services that lead, advise, and support clients, no

matter how big or small, complex or simple.

We help businesses to prepare, protect, detect, respond, and recover along all

points of the business lifecycle. We understand that cyber security and data

protection cannot always be considered in isolation. That’s why each of our services

can be delivered singularly or interdependently to support clients in securing their

organisation and meeting growth goals.

Cyber Security

Data Privacy

Security Architecture Cloud Security

ISO 27001 Risk Management Audit

Business ResilienceIncident Management DPOaaS

Cyber EssentialsPenetration Testing

11

Page 12: OUR PEOPLE EMPOWER YOUR BUSINESS · Business Resilience 17. DPOaaS 18. Penetration Testing 19. Audit 20. Secure Development 21. Creating a Better ... critical business function, yet

Cyber Security consultancy is a specialised and practical solution to help organisations increase

their cyber maturity levels. It enables businesses to increase resilience and gain assurance

through the mitigation of threats and risks.

With the exponential growth of data breaches and malicious attacks, organisations need to

employ the most appropriate cyber security controls available – but with a wide range of

options available, what is appropriate? Our experienced professionals make cyber security

accessible and logical, supporting clients with solutions that work.

C Y B E R S E C U R I T Y C O N S U LTA N C Y

Key benefits • Provides confidence to customers and

stakeholders.

• Avoid financial penalties.

• Reduces risk and increased business

resilience through enhanced cyber

security controls.

• Enables effective capability building for

the organisation.

How it can work for youWe will quickly get to understand your

needs, aspirations and pain points. From

this we will suggest and help embed the

most appropriate controls for your

business.

Depending on your requirements, we can

support you for a specific engagement or

as a managed service.

“Cyber has never been more important as executives and boards continue to face mounting pressure to ensure security and privacy along with success and profitability”

12

Page 13: OUR PEOPLE EMPOWER YOUR BUSINESS · Business Resilience 17. DPOaaS 18. Penetration Testing 19. Audit 20. Secure Development 21. Creating a Better ... critical business function, yet

Reliance on personal data grows and businesses continue to innovate against a backdrop of

enhanced privacy regulation, changing consumer privacy expectations, and demands for

profitability. As a result, businesses face a complicated regulatory, reputational, and operational

data privacy risk environment.

Our teams provide practical business solutions that not only help businesses reduce the risk

associated with privacy obligations, but also leverage the value in their personal data. We help

navigate the legal and regulatory complexities of data protection regulations, enabling

businesses to achieve their goals while ensuring legal and regulatory compliance is maintained.

D ATA P R I VA C Y C O N S U LTA N C Y

Key benefits • Allows the business to make informed,

risk-based decisions.

• Enables growth through qualified new

uses of data.

• Compliance with regulations such as

the GDPR.

• Reduces costs through efficient

controls.

How it can work for youWe can augment existing teams or

provide entire teams to deliver on

challenging projects. Whether you require

a solution to a specific challenge or need

help with your end to end compliance

journey, our experts will deliver the right

solution for your business.

13

Page 14: OUR PEOPLE EMPOWER YOUR BUSINESS · Business Resilience 17. DPOaaS 18. Penetration Testing 19. Audit 20. Secure Development 21. Creating a Better ... critical business function, yet

Most organisations don’t have the resources to employ a full-time CISO, and often don’t know

exactly how to set out a security strategy which enables organisational goals.

Our Chief Information Security Officer as a Service (CISOaaS) provides information security

leadership and strategy. It supports business resilience, provides security guidance to senior

management and drives an organisation’s information security programme.

We embed senior security leadership into an organisation to bring a security lens to the

organisation’s vision, providing a more integrated, strategic partner – one that is better aligned

to the business.

C H I E F I N F O R M AT I O N S E C U R I T Y O F F I C E R A S A S E R V I C E

Key benefits • Practical and cost-effective solution.

• Reduces risk by enhancing cyber and

information strategy with a clearly

defined roadmap.

• Allows access to expertise and

experience not available internally.

• Eliminates the key person dependency

risks.

How it can work for youWe can support you for a specific

engagement or as a managed service.

Your i3Secure CISO will be your own

dedicated resource supported by a team

of senior cyber security professionals with

access to our repository of cyber security

know how, technologies and processes.

“CISO has become a role which modern businesses must have”

14

Page 15: OUR PEOPLE EMPOWER YOUR BUSINESS · Business Resilience 17. DPOaaS 18. Penetration Testing 19. Audit 20. Secure Development 21. Creating a Better ... critical business function, yet

Evolving and more stringent regulation, digital transformation, increased competition and the

need to enhance customer trust all mean that the business landscape is being reshaped faster

than ever before. This change in landscape has reshaped how businesses look at risks and

opportunities.

Aligning to or achieving ISO certification helps businesses demonstrate robust practices,

thereby improving working relationships and retaining existing clients, but also providing a

proven marketing edge against competitors.

Our professionals support client aspirations and help to embed appropriate frameworks in

Information Security (ISO 27001), Business Continuity (ISO 22301) and Data Privacy (ISO 27701).

I S O C O N S U LTA N C Y

Key benefits • Provides confidence to clients and

stakeholders.

• Wins new business and sharpens the

businesses competitive edge.

• Removes burden and responsibility

from a inexperienced BAU role.

• Realises cost and operational

efficiencies from streamlined

processes.

How it can work for youWe know that to achieve your potential

you need a tailored service as much as a

consistent methodology. We use our

sector and subject-matter knowledge, as

well as the latest insights from our

engagements to ensure you receive a

balanced service, fulfilling your needs.

15

Page 16: OUR PEOPLE EMPOWER YOUR BUSINESS · Business Resilience 17. DPOaaS 18. Penetration Testing 19. Audit 20. Secure Development 21. Creating a Better ... critical business function, yet

More than 40% of businesses will never reopen after a major disaster. Catastrophic events like

pandemics, cyber attacks and other major incidents can have a devastating impact on the

operations of organisations. They may result in the loss of systems, inability to function or loss

of key personnel.

In the face of a crisis or economic slowdown, resilient organisations ride out uncertainty instead

of being overpowered by it. Our professionals help develop resilience capabilities to ensure

businesses have the capacity to withstand shocks and navigate disruptive change from a wide

variety of risks and adapt to the new circumstances following a trigger event.

B U S I N E S S R E S I L I E N C E C O N S U LTA N C Y

Key benefits • Resilience ensures businesses avoid

costs and fines arising from crisis

events.

• Ensures service uptime and client

satisfaction.

• Provides valuable cost and operational

efficiencies from streamlined

processes.

How it can work for youWe can support you for a specific

engagement or as a managed service.

Our experts will quickly get to understand

your needs, aspirations and pain points.

From this we will suggest and help embed

the most appropriate measures for your

business to ensure the desired level of

resilience is achieved.

16

Page 17: OUR PEOPLE EMPOWER YOUR BUSINESS · Business Resilience 17. DPOaaS 18. Penetration Testing 19. Audit 20. Secure Development 21. Creating a Better ... critical business function, yet

Data Protection Officer as a Service (DPOaaS) is a practical and cost-effective solution for

organisations who need to fulfil their obligations under the DPA 2018 and the GDPR. For

organisations that do this well, data protection compliance can become a competitive

advantage.

You need to stay focused on your core business activities whilst meeting regulatory obligations.

We provide expert resources to help address the compliance demands of the GDPR, allowing

you to concentrate on growing your business.

D ATA P R OT E C T I O N O F F I C E R A S A S E R V I C E

Key benefits • Practical and cost-effective solution

compared to an internal appointment.

• Access to independent DPO expertise

not available internally.

• Eliminate the key person dependency

risks.

• No conflict of interest between the

DPO and other business activities.

How it can work for youWe can support you for a specific

engagement or as a managed service.

Your i3Secure DPO will be your own

dedicated DPO resource supported by a

team of data protection consultants with

access to our repository of data

protection know how, technologies and

processes.

17

By year-end 2022, more than 1 million organisations will have appointed a Privacy Officer (or Data Protection Officer) – Gartner

Page 18: OUR PEOPLE EMPOWER YOUR BUSINESS · Business Resilience 17. DPOaaS 18. Penetration Testing 19. Audit 20. Secure Development 21. Creating a Better ... critical business function, yet

The cyber landscape continues to rapidly evolve, and the flow of data has increased

exponentially. Whether it’s through 4G on-the-go or Wi-Fi networks, data is consumed through

mobile apps, social media and internet browsing throughout the day. The boundaries of an

organisation’s infrastructure has sprawled outside of the physical constraints of the office.

This change in landscape has intensified the need for businesses to make themselves aware of

the potential holes in their security processes and how a cybercriminal would gain access.

Businesses can no longer install a firewall application and just sit back hoping it will protect its

data and financial assets. Our testing helps businesses to be proactive in analysing these

applications, finding the gaps and patching them before they are exploited.

P E N E T R AT I O N T E S T I N G

Key benefits • Identifies unknown weaknesses before

they are exploited.

• Reduces risk of breaches and

increased business resilience.

• Provides access to niche expertise not

available in-house.

How it can work for youWe work with you to identify the

appropriate scope for penetration testing

to ensure business requirements are met.

An experienced penetration tester

examines your systems for any

weaknesses that could be used by an

attacker, identifying your security posture

and highlighting threats.

1818

Page 19: OUR PEOPLE EMPOWER YOUR BUSINESS · Business Resilience 17. DPOaaS 18. Penetration Testing 19. Audit 20. Secure Development 21. Creating a Better ... critical business function, yet

Audit is about much more than just tick box exercises. Our audits provide assurance and fuel

advancement by demonstrating how things are – and then asking, how can they be made

better?

Through our proven audit methodology, we uncover potential issues and provide greater

insights and perspectives, which addresses risk and can lead to new ways of doing business.

We provide independent third-party audits against ISO 27001 and ISO 27701 standards, either

to provide businesses or their customers with assurance that the management system is

performing as expected, or to prepare clients for external audits by a UKAS accredited

Certification Body.

A U D I T S E R V I C E S

Key benefits • No conflict of interest with other

business activities.

• Delivers stakeholder confidence while

standing up to regulatory scrutiny.

• Provides credibility.

• Cost-effective compared to

maintaining a internal audit function.

How it can work for youOur experienced auditors can conduct

audits for you on an on-demand basis or

as a managed service where we take

responsibility for managing the internal

audit programme.

We use industry recognised audit

methodology in conjunction with the

latest, high-quality auditing tools.

19

Page 20: OUR PEOPLE EMPOWER YOUR BUSINESS · Business Resilience 17. DPOaaS 18. Penetration Testing 19. Audit 20. Secure Development 21. Creating a Better ... critical business function, yet

With organised cybercrime becoming a multi £trillion industry, and stringent regulations being

introduced, responsibilities have shifted towards software organisations, to becoming more

ethical and accountable for their services, in order to avoid substantial financial and

reputational implications.

Introducing a Secure Development Lifecycle (SDL) is the way for organisations to focus on

‘Security by Design’, allowing a ‘shift left’ approach, which enables the production and

deployment of better quality and secure software, faster.

Deploying a SDL, will enable organisations to sell to more, operate in new markets, and comply

with regulations, such as the General Data Protection Regulation.

S E C U R E D E V E L O P M E N T L I F E C Y C L E

Key benefits • Reduces time and therefore cost being

spent on fixing vulnerabilities.

• Meet customer due diligence and

regulatory requirements.

• Sell products in new industries and

markets.

• Unlock the power of data, to do more.

How it can work for youWe can support your end to end

development lifecycle or for specific

elements product development. You will

have access to a team of security

professionals with extensive experience of

developing and embedding secure

development frameworks.

2020

Page 21: OUR PEOPLE EMPOWER YOUR BUSINESS · Business Resilience 17. DPOaaS 18. Penetration Testing 19. Audit 20. Secure Development 21. Creating a Better ... critical business function, yet

Core to our ethics as a business is giving back

to the community and creating opportunities

for the cyber professionals of tomorrow.

We are proud to support a number of

inspirational charities and foundations to help

unlock opportunities for individuals and

organisations.

We work to give young people the skills,

experiences and support to get the jobs they

really want, and connect employers to

talented young people across the UK.

Creating aBetter Tomorrow

In2Science – we provide

coaching, mentoring and

professional support to

empower young people from

disadvantaged backgrounds to

achieve their potential.

STEM CharityCyber Choices National Cyber

Programme – we support the

Police with coaching,

mentoring, rehabilitation and

integration of young cyber

talent into industry.

Cyber Prevent

21

Page 22: OUR PEOPLE EMPOWER YOUR BUSINESS · Business Resilience 17. DPOaaS 18. Penetration Testing 19. Audit 20. Secure Development 21. Creating a Better ... critical business function, yet

Every journey starts with one small step...

Phone Number+44 (0)330 1332617

Email [email protected]

Websitewww.i3Secure.co.uk

22

Mailing ListHere

Floor 3 Castlemead | Lower Castle Street | Bristol | BS1 3AG32 Park Cross Street | Leeds | LS1 2QH