ESID Consulting
  • home
  • our process
  • our services
  • about us
  • contact us
  • articles
  • home
  • our process
  • our services
  • about us
  • contact us
  • articles
Search

Your Insider Risk & Information Security Review


All organisations but especially those in critical industries, family offices, the aerospace and the maritime sectors face the challenges of state sponsored attack, insider threat, cyber-crime, industrial espionage, bribery, corruption and data breach.

The lack of systems and policies needed to respond properly to a cyber attack, corrupt approach or data breach are often only realised after the inevitable happens;


  • when you discover that a "disgruntled" employee has been able to delete, steal or leak your intellectual property or most sensitive data to a competitor.
  • or that an honest hardworking employee has made a mistake and clicked on a malicious link or sent a payment to a fraudulant bank account.
  • and maybe, because of way you manage your infrastructure and your 3rd party supplier relationships, you find yourselves unable to recover from business disruption or to access your data quickly enough to avoid damage to your organisation or its reputation after a cyber-attack.

With the advent of anti-bribery and corruption legislation, GDPR and the NIS the penalties are also getting larger and if you are a director or trustee you can be held personally liable for any damages - if you don't have appropriate "systems" in place to protect your information and organisation.

Our Insider Risk & Information Security Review  aims to prevent these issues by following our six-step process outlined below.

We take a holistic look at your business and your security posture and identify current and future challenges, roadblocks, risks and threats that have the potential to adversely impact your business.

Using our proprietary Security Risk Assessments, developed from our experience dealing with internal investigations and counter-corruption enquiries within New Scotland Yard's Metropolitan Police, the UK Government and in private organisations, we'll build a detailed gap analysis and security roadmap. Outlining what you will need to do to ensure that your policies, procedures and infrastructure can support your organisation.

We charge a flat fee for this review and will apply it as a credit towards the execution of any future work with us.  This credit does not expire.

We look forward to learning more about your business and how we can help you improve your organisational resilience and security.


Gary Peace
Founder & CEO


Your First Steps Towards Greater Security


1. INITIAL CALL


A quick call to learn more about each other. We'll discuss where you are now and where you need to be; what's working well for you at the moment .....and what isn't - Those issues that keep you awake at night!  We'll also determine if we are the right fit to provide the help you need.


2. INFORMATION GATHERING


We'll send you a mutual Non Disclosure Agreement (NDA) and a list of information we'll need, including your current organisational structure, a list of your information assets, any regulatory or legislative requirements you are bound by etc.  We'll also ask for your 3rd party service providers, a network topology and what software and business critical systems you use to run your business today.


3. DISCOVERY


Guided by our proprietary Security Risk Assessments, you'll show and tell us how you operate, across the business. We'll watch, listen, learn and document. Our partnership begins here. We will alert you straight away to any red flags we identify and won't leave you vulnerable in the interim, waiting for the report to be issued.


4. ANALYSIS


We will take the results of the discovery process and work with you to generate an assessment of your security posture, with a focus on the "quick fixes" first and then the organisational culture, policies, procedures and systems that have the potential to compromise your security, introduce new risks and amplify those vulnerabilities you already have.


5. PRESENTATION


At the conclusion of your security review, we will provide you with a:
  • presentation of your challenges, roadblocks, risks and threats
  • gap analysis of what you are missing
  • technology, process and people roadmap

...essentially, everything you will need to upgrade, improve, implement to ensure that your organisation is as resilient and secure as it can be.

6. NEXT STEPS


Based on the results of your security review, you might choose to proceed down one of two paths:
  1.  Allow us to author a more extensive Custom Project Proposal to help with implementation of the key findings in your Security Risk Assessment.
  2.  Join our Security Partner Program, a service which provides ongoing expert support for your daily security operations, regular reviews and strategic input for key initiatives. 

We look forward to partnering with you to ensure your organisational resilience is where you need it to be.

Home | Our Services | About Us | Contact
© COPYRIGHT 2018. ALL RIGHTS RESERVED.
  • home
  • our process
  • our services
  • about us
  • contact us
  • articles