Professional Documents
Culture Documents
concerned about GDPR making a successful organisation’s current Companies concerned UK+I Bank concerned
changes / compliance digital transformation cyber security state about active threats about governance
(CBEST or regulatory
equivalent)
Identifies current
organisational cyber
security maturity and
produces roadmap to
attain the desired
Identifies current, active
maturity over the coming
threats on organisation’s
years
network
Couples to further Cisco
Utilises Cisco Tech to
offerings to get the client
demonstrate the Service and
to the maturity they are
HW capabilities whilst
Identifies areas of looking to achieve
helping to eliminate current
non-compliance with problems
GDPR regulation
Proactive
Threat Hunting
DISCOVERY
GDPR
Service
Identifies areas of
CMPA weaknesses by simulating
a real world adversary,
which exercises the
security controls that are
in place across many
areas
CyberSecurity Management
Programme Assessment
Red Team
Third-Party Risk
CMPA, ATA Assessments
SOC Enablement, Pen Testing CMPA, ATA,
Segmentation, IR Programmes, IR SOC Enablement,
Retainers and Planning Retainers and Planning Segmentation, IR
Retainers and
Planning
CMPA, ATA,
REMEDY
CloudLock, Umbrella, Identity Services Engine (ISE) & TruSec, ASA with
CliQr, Tetration, FirePOWER™ Services, Stealthwatch®, Umbrella,
Stealthwatch Advanced Malware Protection (AMP), Next-
Generation Firewall (NGFW), Next-Generation
Intrusion Prevention System (NGIPS), Cognitive
Threat Analytics, Defense Orchestrator, CloudLock,
Threat Grid, Email Security, Web Security, Tetration