Security Essentials Tabletop Exercise
The main purpose of this exercise is to educate your management team on the importance of Cyber Security Essentials for overall business wellbeing. We will discuss where the company’s current position is within the framework of the maturity model and compliance standards need to be adhered to for compliance. Upon completion, this exercise will turn your management team into cyber security fans and will ensure their support in budgeting cyber security solutions.
Security Essentials Workshop
This workshop examines the corporate position in relation to each Cyber Security Essential. Conducted in collaboration with your cyber security / IT team, MBS Techservices will examine your current security capabilities, identify risks, and create a report card with findings and recommendations to guide your security program in ensuring it aligns with your business needs and maximizes your security investment. This workshop can be conducted as a bridge to a comprehensive Enterprise Maturity Assessment study.
Enterprise Maturity Assessment
This is a detailed examination of corporate cyber security procedures, processes, and practices, as well as tools and solutions. Our team will interview your staff, review all IT environments, security policies, processes, standards, incident response plans, data flow diagrams, configurations, documentation describing current controls and their maturity. We will run a comparative analysis against the industry-accepted standards and guidelines (e.g., COBIT, NIST CSF, NIST 800-53, ISO/IEC 27001 and 27002, etc.), which are relevant to your business, prepare gap analysis, develop evaluation ratings and recommendations for achieving full compliance.
Health Check / Environment Scans
This service is designed as follow-ups to the Maturity Assessment service or Security Essentials Workshop. Periodical reviews of the corporate progress in achieving the full maturity will ensure the security program aligns with business objectives and remains in sync with the changing external threat environment.