Advisory

Advisory

To effectively address the diversity of needs of your security program, we offer you the flexibility to engage with our suite of cybersecurity professionals on a Time & Material basis.

Down arrow

Services

Kobalt_illustration-Device Connect

Virtual CISO

A senior, experienced security professional that can be called on for advisory purposes. Virtual CISO can help you evaluate risks, determine technology solutions, evaluate technical controls, select compliance standards and plan and execute roadmap items.

Privacy Consultant

Our Privacy Consultants are well versed in privacy standards including PIPEDA/PIPA (Personal Information Protection and Electronic Documents Act/Personal Information Protection Act), CCPA ( California Consumer Privacy Act),  GDPR (General Data Protection Regulation),* and more. They can help you identify privacy requirements, alignment with applicable regulations, review and help to update policies and documentation and more.

Security strategy planning
Vulnerability Assessment

Security Project Manager

Our security project manager can be tasked with ensuring that security programs and projects are delivered on time, to budget. While this is included in our fixed-scope projects from Kobalt.io, projects run inside client environments using our T&M resources or internal staff can also benefit from this support.

Governance, Risk and Compliance (GRC) Support

Our GRC support can be used for items such as security questionnaire responses, managing 3rd party risk assessments, supporting policy development and other activities under the direction of our security program leads.

Scale
Privacy

Digital Forensics and Incident Response

Our experienced digital forensics team can conduct in depth analysis of security breaches, log events, laptops, cell phones and other digital devices. In addition, they can provide live assistance in case of an ongoing incident.

Questionnaire Support

For security questionnaires, we leverage our Junior GRC resource to provide offloading of effort from your team leads. The setup involves digesting previous questionnaire responses provided by your team, who will retain responsibility for final review and completion of any information missing from your security documentation.

Security strategy planning

Our Approach

Scope

We will run an initial discovery call with you to understand your needs, resources, and expectations; and conduct an initial analysis of the current environment to gather findings.

Recommend and Confirm Desired Service Approach

Based on our findings, we will provide recommendations that are tailored to your unique situation, and align a desired service approach with you.

Kick-off

Once the service approach is confirmed, we are ready to work on the remediations with your team.

Let us know how we can support you

Don’t see what you’re looking for here? Don’t worry, if it’s IT Security we can likely assist!

We draw on a network of over 100 independent cyber security professionals globally to enhance the capabilities of our in-house team to ensure our clients and partners get the solutions they’re looking for. Contact us today.