Technology Risk Advisory

In a world where data breaches and cybercrime are increasingly common, business as usual may leave you vulnerable. In the event of a disaster or other unexpected event, having access to your Information assets is critical.

Companies often tackle security issues with annual expenditures on staff and technology, leaving the problem to an overworked IT department. This can be expensive and inefficient, and often misses the overall strategic goal of decreasing organizational risk.

There’s a better way to manage and reduce risk. A risk management program built around an end-to-end suite of Security Services will increase your organization’s capabilities with a customized security strategy. This can include a prioritized roadmap of investments based on risk/impact and compliance with the industry standards to which your organization must adhere.

A custom Risk Management Program could include not only CISO as a Service services but also:

  • Security Testing, including Remote Testing
  • Security Audits
  • Training and Workshops
  • Risk Assessments
  • Privacy Impact Assessments and Consultation
  • Security Gap Assessments
  • Business Continuity / Disaster Recovery Plans
  • Project Security Management

Security Testing

Security Testing reveals gaps in the security mechanisms of an information system and includes the recommended remediations.

  • Vulnerability Testing examines the security posture of your IT infrastructure and systems, and the physical security and stability of the premises.
  • Penetration Testing verifies that the implemented systems/controls are not exploitable through means other than the obvious ones. This type of test can show whether a weakness is exploitable in the real world.
  • Phishing occurs when an email appears to be from a trusted source, but it’s a cybercriminal attempting to steal confidential information. We can conduct Phishing Email Testing to make sure your workforce is as prepared as possible to prevent a security breach.

In order to provide comprehensive security testing services in the most timely and safe manner possible during the lockdown, we have developed remote testing capabilities as an option for our clients. With this service, Cognitive Technologies sends a secure, pre-configured connection to your site and then a our resource runs the assessments remotely via this secure network connection. No need for having a third-party contractor on site to complete necessary security testing.

Security Audits

Security Audits can be costly, but our experienced and certified professional team can help decide what needs to be audited, resulting in decreased audit findings and additional costs. We’ll prepare you for external security and business continuity audits (External & Certification Audits ISO27001, ISO22301, etc.) by helping to identify and review the required resources and evidence.

Risk Assessments

Risk Assessments evaluate threats, vulnerabilities, impacts and residual risks inherent in your organization’s information systems and creates a plan to address them. Understanding the security risks you face allows you to manage expenditures and plan for improved security of internal and customer data. Regular risk assessments are a requirement of most security standards including ISO27001 and PCI-DSS. Examples of risk assessments that Cognitive Technologies can provide include:

  • A Business Impact Assessment (BIA) gives you a plan to follow in the event of a natural disaster or other external force that impacts your operations. Recovery Plans require an annual BIA to ensure the risks and threats to an organization haven’t changed or evolved.
  • A Privacy Impact Assessment helps you better plan for the management and handling of personal information, especially when launching a new or modified service
  • Third Party due diligence and Risk Assessments can help you ensure that third party organizations with which you plan to do business have appropriate security controls in place as well.

Privacy Impact Assessments

Privacy is a strong concern for governments, regulators and your clients. Cognitive Technologies can provide a certified privacy professional to review and assess your organization’s handling of private or personally identifiable information.

Security Gap Assessments

Security Gap Assessments help you identify where to best invest your efforts to improve your organization’s security. We’ll identify vulnerabilities and ensure that the appropriate security controls are in place.

Business Continuity / Disaster Recovery Plans

Business Continuity and Disaster Recovery Planning are essential to any size of organization, so you are prepared for impactful events such as a flood, fire, pandemic, cyberattack, or the like. Cognitive Technologies can help build, modify, maintain and test these plans with the help of one of our Certified Business Continuity Professionals. See more.

Project Security Management

If you’re providing a managed project to a client or a third party is delivering a project to you, Cognitive Technologies has experience evaluating, compiling and measuring the security requirements that you might need. We can provide you with a security matrix for your project based on industry standards and/or your own specific security requirements.

Speak to our consultants now and find out how we can help you to mitigate your risks.

Subscribe For Updates

Parliamentary Avenue, Kampala, P.O. Box 23990 Kampala, Uganda

Privacy Policy © 2020 Cognitive Technologies Limited. All Rights Reserved. Design by tony@bulamu.net