What We Do

Strapline.png
 

Adapt.

KNOW your business, the RELEVANT REGULATIONS & standards, and the threats it faces

Definition, Management & Sponsorship

Policy, Management System, Process & Procedures

Including FCA SYSC, SOC 2, PCI DSS, GDPR, EU DORA

ISO22301, ISO27301, BCI GPG, ITIL, COBIT etc

Analysis of impact of loss over time, criticality of processes, and resources to recover

Potential threats and their probability, any existing mitigation measures

Decide how to deal with the threats and meet business recovery requirements

Co-ordinate teams across cultures and time zones (Americas, EMEIA, and Asia)

Bridge from Board level (CEO, CFO, CIO and CRO) down to team level

Prepare.

Build the PLANS, SOLUTIONS & tools to prepare against the threats

Including cyber incident response playbooks (ransomware etc), crisis management plans, business continuity plans, and IT recovery plans

Including work area recovery sites, dual data centres, replicated data, and cloud services

Including business continuity planning and mass notification tools

Validate whether plans, solutions and tools meet business recovery requirements (including technical tests, desktop rehearsals, call cascades and live tests)

RFIs and RFPs for selection of new third party services including tools, data centres, work area recovery sites, and cloud services

Relationships with third party suppliers of outsourcing and recovery services

Thrive.

Have the confidence to make your business thrive in the present and the future

Dealing with incidents with ease gives you confidence - you can handle the worst - that carries over to your day to day