RnR Consultant

Services

Process Assessment
 Creation of ERM Policy
 Finalization of Organizational Risk Appetite 
 Identification of organizational assets/ processes/ Products 
Creation of Risk management framework 
Conduct Risk Assessment 
 Identification and gap clouser
Process Audit

ERM

  • Process Assessment
  • Creation of ERM Policy
  • Finalization of Organizational Risk Appetite
  • Identification of organizational assets/ processes/ Products
  • Creation of Risk management framework
  • Conduct Risk Assessment
  • Identification and gap clouser
  • Process Audit
Creation of Security Policy
Creation of procedures, processes and guidelines 
Designing process CTQs 
Designing of security SLAs/KPIs 
 6 months remote implementation support

Policy & Procedure

  • Creation of Security Policy
  • Creation of procedures, processes and guidelines
  • Designing process CTQs
  • Designing of security SLAs/KPIs
  • 6 months remote implementation support
Define Fraud Management Policy
 Define Fraud Management Framework
 Assess Risk in Organizational Framework
 Implement Framework
 Audit Assisstance

Fraud Mangement

  • Define Fraud Management Policy
  • Define Fraud Management Framework
  • Assess Risk in Organizational Framework
  • Implement Framework
  • Audit Assisstance
Process Assessment
Information Security Policy

ISMS

  • Process Assessment
  • Information Security Policy & Procedure Creation
  • Scope of Applicability defination
  • Creation of control procedures
  • Asset Identification
  • Risk assessment
  • Risk Treatment plan Implementation
  • Control Implementation
  • Internal Audit
  • Training and Awareness
  • Certification assistance
  • Automation of ISMS
Creation of OS hardening document :- Windows, Unix based 
Creation of database hardening document 
Creation of hardening manuals of network/security devices

System Hardening

  • Creation of OS hardening document :- Windows, Unix based
  • Creation of database hardening document
  • Creation of hardening manuals of network/security devices
Process Assessment 
Framework Development
Framework Implementation
Process Audit

Compliance(SSAE16, HIPPA, SOX)

  • Process Assessment
  • Framework Development
  • Framework Implementation
  • Process Audit
Define LAN Zoning and Data Traffic Flow Security Policy 
 Design Network Architecture
Designing process CTQs 
Deployment of rules - one time
 Deployment of UTM with following features
Firewall, Intrusion Prevention System, Gateway Antivirus, Web Filter, Spam Filter, SSL VPN

Network Security

  • Define LAN Zoning and Data Traffic Flow Security Policy
  • Design Network Architecture
  • Designing process CTQs
  • Deployment of rules – one time
  • Deployment of UTM with following features
  • Firewall, Intrusion Prevention System, Gateway Antivirus, Web Filter, Spam Filter, SSL VPN
Process Assessment 
Creation of privacy policy 
 Identification of critical information
  Mapping of information flow
 Risk assessment (information Risk assessment, Supporting Asset Risk Assessment)
 Implementation of RTP
Documentation and Implementation of control 
Framework Testing 
Internal Audit 
Certification Assistance 
PIMS Automation

PIMS

  • Process Assessment
  • Creation of privacy policy
  • Identification of critical information
  • Mapping of information flow
  • Risk assessment (information Risk assessment, Supporting Asset Risk Assessment)
  • Implementation of RTP
  • Documentation and Implementation of control
  • Framework Testing
  • Internal Audit
  • Certification Assistance
  • PIMS Automation
Documentation of SOC management and administrative components
 Deployment of SIEM too
 Configuration Management
Document the mechanics of daily operations 
Rule definition and deployment 
Monitoring 
 Ticket Management

Security Operation Center

  • Documentation of SOC management and administrative components
  • Deployment of SIEM too
  • Configuration Management
  • Document the mechanics of daily operations
  • Rule definition and deployment
  • Monitoring
  • Ticket Management
Process Assessment
BCMS Policy

BCMS

  • Process Assessment
  • BCMS Policy & Procedure Creation
  • Creation of control procedures
  • Asset Identification
  • Business Impact Analysis (Product / Process / Application)Risk assessment(FMEA, Site Risk Assessment, DC Risk Assessment, Critical Asset Risk Assessment)
  • Risk Treatment plan Implementation
  • Recovery Stratergy development / Implementation
  • Plan Creation (Business Continuity, Functional Recovery, Crisis Management, Disaster Recovery)
  • Plan Testing
  • Training and Awareness
  • Certification Support

Our PARTNERS

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12