Logo EthiSecure

Consulting and Advising Services

Do you need guidance or assistance in order to meet privacy and security related obligations? If you require an assessment of your cybersecurity posture, a security architecture based on Best Practices, or a Subject Matter Expert for that next big privacy project, let us help you.

Subject Matter Expertise

Smaller organizations may need to bring in a specialist from time to time, to address specific security-related needs. Larger organizations sometimes need assistance from experienced security professionals, in order to meet project deadlines or to simply get a second opinion.


An external security Subject Matter Expert (SME) can step in to bring timely perspective, advice and assistance in a cost-effective manner.  We can help and assist with a variety of deliverables and activities such as security architecture and requirement definition, project accompaniment, vulnerability assessment, hardening recommendations, remediation plan implementation and knowledge transfer.


Benefits:

  • Accessing expert advice on demand;
  • Getting unbiased opinions;
  • Saving money on specialized staff training;
  • Increasing ROI through quicker turnaround times.


We are experienced as tactical as well as strategic Subject Matter Experts in information security.  Pertinent certifications and certificates held by EthiSecure staff include:

Certified Information Systems Security Professional (CISSP) - ISC2

Certified Information Systems Security Professional (CISSP)

ISC2

GIAC Defensible Security Architecture (GDSA) - GIAC Certifications

GIAC Defensible Security Architecture (GDSA)

GIAC Certifications

5G Certified Professional - 5G Secured Networks - Nokia Bell Labs

5G Certified Professional - 5G Secured Networks

Nokia Bell Labs

Virtual CISO and/or CPO/PO

Small and medium size enterprises (SMEs) operate with a few key executives.  A challenge can arise with needs to meet ever-increasing security and privacy challenges, as these also require upper management direction in order to ensure alignment with business needs and corporate culture.


Access to an on-demand or part-time specialist to fulfill a C-class information security (vCISO) or data privacy role (vCPO, vDPO or vPO) can be a viable option for many SMEs needing to occasionally evaluate and support security and privacy needs, particularly as regulatory obligations and market pressures  increase.


Benefits:

  • Evaluating security from a business perspective;
  • Keeping focus on the business;
  • Accessing security opinions and advice on-demand;
  • Saving on headcount and training costs.


We are experienced as strategic as well as tactical Subject Matter Experts in information security.  Pertinent certifications and certificates held by EthiSecure staff include:

Certified Information Systems Security Professional (CISSP) - ISC2

Certified Information Systems Security Professional (CISSP)

ISC2

Certified Chief Information Security Officer (CCISO) - EC-Council

Certified Chief Information Security Officer (CCISO)

EC-Council

Certified Information Privacy Professional/Canada (CIPP/C) - IAPP

Certified Information Privacy Professional/Canada (CIPP/C)

IAPP

Security Policy Development & Review

Through the development and subsequent maintenance of a documented security policy ruleset (generally comprised of policies, processes, standards and procedures), organizations define a framework of how the business is expected to be run.


Care is required to ensure that policies are aligned with objectives, practices and organizational capabilities.  An experienced specialist in policy development can help organizations define necessary security-related implementations and behaviours, and capture them in documents that are aligned with existing methodologies as well as with your corporate culture.


Benefits:

  • Defining policies that attain objectives;
  • Adapting existing processes to meet new needs;
  • Aligning with standard security policy frameworks;
  • Complying to regulatory standards.


We are experienced in the development and review of information security policies.  Pertinent training attended by EthiSecure staff include:

MGT524: Security Policy and Awareness - SANS Institute

MGT524: Security Policy and Awareness

SANS Institute

Risk Analysis & Assessment

Assessing threats to your business can often be an overwhelming task.  So is determining levels of risk based on those threats actually materializing.  Must the most remote risks be assessed?  How to quantify those risks?  How to ensure that the most important risks are addressed?  What are my levels of risk tolerance?  And how to handle the security risks that are not at the top of a priority list?


An experienced security and privacy risk assessor can help an organization formalize the analysis, assessment, review and decision-making process used to address and treat business-critical risks affecting your organization.


Benefits:

  • Defining, evaluating and assessing security risks;
  • Selecting courses of action to reduce exposure;
  • Avoiding or mitigating threats that exploit risks;
  • Recording and gaining approval for residual risk treatment plans.


We are experienced in information security risk analysis and assessment.  Pertinent certifications and certificates held by EthiSecure staff include:

ISO/IEC 27001 Lead Implementer - PECB

ISO/IEC 27001 Lead Implementer

PECB

CERT Cybersecurity Engineering and Software Assurance Professional - CMU SEI

CERT Cybersecurity Engineering and Software Assurance Professional

Carnegie Mellon University - Software Engineering Institute

Share by: