
ERM
- Process Assessment
- Creation of ERM Policy
- Finalization of Organizational Risk Appetite
- Identification of organizational assets/ processes/ Products
- Creation of Risk management framework
- Conduct Risk Assessment
- Identification and gap clouser
- Process Audit

Policy & Procedure
- Creation of Security Policy
- Creation of procedures, processes and guidelines
- Designing process CTQs
- Designing of security SLAs/KPIs
- 6 months remote implementation support

Fraud Mangement
- Define Fraud Management Policy
- Define Fraud Management Framework
- Assess Risk in Organizational Framework
- Implement Framework
- Audit Assisstance

ISMS
- Process Assessment
- Information Security Policy & Procedure Creation
- Scope of Applicability defination
- Creation of control procedures
- Asset Identification
- Risk assessment
- Risk Treatment plan Implementation
- Control Implementation
- Internal Audit
- Training and Awareness
- Certification assistance
- Automation of ISMS

System Hardening
- Creation of OS hardening document :- Windows, Unix based
- Creation of database hardening document
- Creation of hardening manuals of network/security devices

Compliance(SSAE16, HIPPA, SOX)
- Process Assessment
- Framework Development
- Framework Implementation
- Process Audit

Network Security
- Define LAN Zoning and Data Traffic Flow Security Policy
- Design Network Architecture
- Designing process CTQs
- Deployment of rules – one time
- Deployment of UTM with following features
- Firewall, Intrusion Prevention System, Gateway Antivirus, Web Filter, Spam Filter, SSL VPN

PIMS
- Process Assessment
- Creation of privacy policy
- Identification of critical information
- Mapping of information flow
- Risk assessment (information Risk assessment, Supporting Asset Risk Assessment)
- Implementation of RTP
- Documentation and Implementation of control
- Framework Testing
- Internal Audit
- Certification Assistance
- PIMS Automation

Security Operation Center
- Documentation of SOC management and administrative components
- Deployment of SIEM too
- Configuration Management
- Document the mechanics of daily operations
- Rule definition and deployment
- Monitoring
- Ticket Management

BCMS
- Process Assessment
- BCMS Policy & Procedure Creation
- Creation of control procedures
- Asset Identification
- Business Impact Analysis (Product / Process / Application)Risk assessment(FMEA, Site Risk Assessment, DC Risk Assessment, Critical Asset Risk Assessment)
- Risk Treatment plan Implementation
- Recovery Stratergy development / Implementation
- Plan Creation (Business Continuity, Functional Recovery, Crisis Management, Disaster Recovery)
- Plan Testing
- Training and Awareness
- Certification Support
Our PARTNERS
Copyright @ 2017 RNR CONSULTING | All Rights Reserved | Developed by Webley