ISMS Consultancy, Implementation & Assessment

ISMS Consultancy & Implementation
We undertake ISMS Consulting and Implementation assignments which covers the complete ISMS implementation cycle from an initial gap analysis, formation of the ISMS management structure, asset identification and classification, risk analysis, risk treatment and internal ISMS audits.
ISMS Auditing & Certification
Periodic assessment of ISMS from internal and external perspectives based on the defined ‘Statement of Applicability’ (SOA) helps the organization to identify the risks at the right time and mitigate it. Our audit team can help in assessing the Information Security Health of the organization against ISO 27001 standards, organization’s defined requirements, customer specific requirements or regulatory requirements. We undertake the evaluation of ISMS against certification requirements and help in identifying and bridging the gaps. Our team of auditors has long years experience in the IT Security and is certified in ISO 27001, CISA and CISM etc. We provide assistance in achieving formal certification through a third party certification agency.
Training and Education
In any organisation, employees are the weakest link in the security chain and are the biggest threats to any organization. We help you in scientifically assessing the awareness levels and conduct Security Awareness training for staff on all aspects of ISO 27001 to bridge the gaps. The training is delivered by highly experienced & professional consultants. Their comprehensive theoretical knowledge will be extended to participants, which will help to create confidence in the respective areas.
Documentation
Documentation is one of the most critical phases of any ISMS. Our consultants will help you to write the security policies, statements of applicability, procedures, manuals and controls. We will ensure that all relevant documentation required for ISMS are prepared and logs of relevant policies are maintained for at least one month before the external compliance audit takes place.
The documentation includes
  1. Asset Register
  2. Risk Assessment Matrix
  3. Risk Treatment Plan
  4. Information Security Management Policy
  5. Procedures Manual
  6. Business Continuity Plan
  7. Disaster Recovery Plan
Details and scope of the documentation will depend on your requirements. And whatever these requirements are, we will help you to meet them.
Technical Reports
Our technical staffs are highly skilled & experienced. We design, implement and consult on a wide range of technical information security issues.
Services


Quick Contact