Cyber Security: 5-Day Assessment

BUI (Pty) Ltd

The BUI team have in-depth knowledge and experience across several next generation solutions that are redefining the way that the world looks at information security.

Is Your Business Challenged Around Cyber Security and Identity Management?

Success starts with security. Choosing the right security partner should never carry the same stress as having to deal with a security breach.

The most effective way to protect against exposure to vulnerabilities is to develop intelligence around your assets via assessment and to harden these systems to minimise your attack landscape.

The BUI team have in-depth knowledge and experience across several next generation solutions that are redefining the way that the world looks at information security.

The assessment covers key components such as:

  • Exploit mitigation
  • Business Continuity / Disaster Recovery (BC/DR)
  • Lateral Traversal / Securing Privileged Access
  • Attack Surface Reduction of your cloud assets

Deliverables

  • Multi-layered security where we ensure identity, on-premise & cloud based assets and all-important network edge is no longer a pipe dream but rather a reality.
  • Information Security gap assessment and remediation roadmap development.
  • Cybersecurity testing and improvement service.
  • Information security training and awareness.
  • Platform and Network Security Assessments, Vulnerability Scanning, Emerging Technology Risk Assessment
  • Cyber Security and Risk Findings Report

Agenda

Day 1 - Data Gathering and Information

  • Rapid Cyber Security Assessment Workshop
  • Technical Requirement Workshop
  • Environment Assessment

Day 2 - Interview Series Round 1

  • NIST Cyber Security Controls 1 -10

Day 3 - Interview Series Round 2

  • NIST Cyber Security Controls 11 -20

Day 4 - Benchmarking and Inventory Analysis

  • Benchmarking and Inventory Analysis

Day 5 - Cybersecurity Feedback

  • Cyber Security Roadmap and Critical Findings Discussion
  • Final Report Presentation

This offer includes a Risk Mitigation Proposal

https://store-images.s-microsoft.com/image/apps.19181.9f14cccf-f559-4b5f-809e-ca22dfec3ae5.74baed46-a312-4aa2-8a1c-6471bea72280.b48d8009-a50b-4ba1-a38a-bba44ea2be6a
https://store-images.s-microsoft.com/image/apps.19181.9f14cccf-f559-4b5f-809e-ca22dfec3ae5.74baed46-a312-4aa2-8a1c-6471bea72280.b48d8009-a50b-4ba1-a38a-bba44ea2be6a