Advisory

Advisory

To effectively address the diversity of needs of your security program, we offer you the flexibility to engage with our suite of cybersecurity professionals on a Time & Material basis.

Our Approach

Scope

We will run an initial discovery call with you to understand your needs, resources, and expectations; and conduct an initial analysis of the current environment to gather findings.

Recommend and Confirm Desired Service Approach

Based on our findings, we will provide recommendations that are tailored to your unique situation, and align a desired service approach with you.

Kick-off

Once the service approach is confirmed, we are ready to work on the remediations with your team.

Services

Security Program Lead/ Virtual CISO:

A senior, experienced security professional that can be called on for advisory purposes. The Security Program Lead/virtual CISO can help you evaluate risks, determine technology solutions, evaluate technical controls, select compliance standards and plan and execute roadmap items.

Privacy Consultant

Our Privacy Consultants are well versed in privacy standards including PIPEDA/PIPA (Personal Information Protection and Electronic Documents Act/Personal Information Protection Act), CCPA ( California Consumer Privacy Act),  GDPR (General Data Protection Regulation),* and more. They can help you identify privacy requirements, alignment with applicable regulations, review and help to update policies and documentation and more.

Vulnerability Assessment

Security Project Manager

Our security project manager can be tasked with ensuring that security programs and projects are delivered on time, to budget. While this is included in our fixed-scope projects from Kobalt.io, projects run inside client environments using our T&M resources or internal staff can also benefit from this support.

Junior Governance, Risk and Compliance (GRC) Resource

Our junior GRC resource can be used for items such as security questionnaire responses, managing 3rd party risk assessments, supporting policy development and other activities under the direction of our security program leads.

Scale
Strong cyber security program

Infrastructure and Software

Our delivery engineers can take hands-on responsibility for deployment of technical controls, securing cloud SaaS services, implementation of firewalls, anti-malware, deployment of VPNs and more. This enables your internal dev team to focus on developing new features.

Delivery Engineer – Cloud

Our delivery engineers for cloud services (Amazon Web Services, Microsoft Azure, Google Cloud) can help ensure proper security standards are applied, and that your cloud is not a vector of risk for your client’s data.

Privacy

Digital Forensics and Incident Response

Our experienced digital forensics team can conduct in depth analysis of security breaches, log events, laptops, cell phones and other digital devices. In addition, they can provide live assistance in case of an ongoing incident.

Questionnaire Support

For security questionnaires, we leverage our Junior GRC resource to provide offloading of effort from your team leads. The setup involves digesting previous questionnaire responses provided by your team, who will retain responsibility for final review and completion of any information missing from your security documentation.

Don’t see what you’re looking for here? Don’t worry, if it’s IT Security we can likely assist!

We draw on a network of over 100 independent cyber security professionals globally to enhance the capabilities of our in-house team to ensure our clients and partners get the solutions they’re looking for. Contact us today.