The Virtual CISO
By providing the necessary thought leadership to address cyber resilience, the virtual CISO becomes your critical friend and points, and keeps you, in the right direction.
Assess The Risk
This involves a series of assessment (threat, vulnerabilities and risk), the development of a set of information security policies – normally aligned to a ‘standard’ ISMS such as ISO 27001, an analysis to the HEI’s adherence to those policies (which turns into a regular audit of compliance) and the development of an information security strategy and plan to remediate any ‘gaps’ between where they are and where they need to be over time.
Protect Your Assets
Protecting your information assets takes many forms and depends on the environment, the assets your protecting and your organizational maturity. It normally takes a combination of technical and operational capability from secure configuration and patch management through to firewalls, network and service access controls, intrusion prevention, secure development and the implementation of a SIEM to monitor log activity.
Operate With Confidence
Having the appropriate information security management system in place gives you the confidence to safely operate your institution across administration, teaching and learning, and research. Behind the scenes monitoring services, threat hunting and investigation, and consistent and active incident response and remediation supports that confidence and along with a regular targeted awareness programme completes the information security management cycle.