logotype

© 2023 RNR Consulting Pvt. Ltd. All Rights Reserved.

All content, including text, images, graphics, and logos, on this website is the property of RNR Consulting Pvt. Ltd. and is protected by copyright laws. Unauthorized use or reproduction of any materials from this site is strictly prohibited without prior written consent from RNR Consulting Pvt. Ltd.

We actively monitor and enforce our copyrights to protect our intellectual property. Any infringement may result in legal action.

For inquiries regarding the use of our materials or to request permission for use, please contact us at info@consultrnr.com.

    Service Request Form

    Select Service(s) You Want:

    Information & cyber security program strategy & roadmapEnterprise & cyber security risk assessment & managementThird party risk managementVirtual CISO serviceCyber security awareness programPhishing simulation programThreat modelingUser access governance & certificationIncident management and response planISO 27001/22301/27701/9001RBI master directionNHB cyber security guidelinesIRDAI cyber security guidelinesNIST FrameworkSOC1/SOC2Data localization as per RBI circular of storage of payment system dataCIS frameworkInternal audit managementCloud assessment as per CISDesigning cloud security architectureCSPM security monitoringGap assessment as per applicable guidelinesNetwork architecture reviewFirewall rule reviewFirewall configuration reviewSystem hardening checksVulnerability assessment program managementWeb application penetration testingMobile application penetration testingInfrastructure vulnerability assessmentAPI vulnerability assessmentAPI fuzzingRed teaming ExerciseData protection advisoryData flow diagramDigital personal data protection acData protection controls implementationData discovery and classificationDesigning of data protection policyData governance programDigital personal data protection acGap assessmentArticulation of policy and proceduresISO 27001/22301/27701/9001, PCI-DSS, SOC1/SOC2, COBIT, COSO, HIPPA, RBI, IRDAI, NIST, Data Localization, CISGRC tool implementationArticulation of BCP plan and strategyCrisis management planBCP/DR planning and implementationImplementation of BCMS standard (ISO 22301)Conducting actual and tabletop DR drillsFunctional recovery planGRC resource deployment onsite/offsiteSecurity services resource deployment onsite/offsite

    Contact Details:

    Name (required):

    Organization Name (required):

    Email (required):

    Contact No (required):

    Detail about the requirement (optional):