top of page
OT Cyber-security Consultant
Identify
-
Cybersecurity Risk Assessment
-
​Vulnerability Assessment
-
Cybersecurity requirements specifications (CSRS)
-
Security Architecture design
-
Brown field data collection
-
Design proposals
-
Product selection
Recover
Business recovery planning
Business continuity planning
Computer / Application Backup Management
Protect
Domain Controller (Role Based Access)
Anti-Virus
USB Malware Scanning Appliance
Application Whitelisting
Data Loss Prevention
Patch Management
RADIUS (AAA)
Network Segmentation / Air gapping
Training and Awareness
.
-
.
Detect
-
Security Information and Event Management (SIEM)
-
On access / On demand scan’s
-
DLP
-
Nozomi Appliance
Respond
-
Incident response procedure
-
Preparation support Risk analysis
-
Risk mitigation
NIST
cyber
Cyber
NIST
1/4
bottom of page