What We Do
Adapt.
KNOW your business, the RELEVANT REGULATIONS & standards, and the threats it faces
Definition, Management & Sponsorship
Policy, Management System, Process & Procedures
Including FCA SYSC, SOC 2, PCI DSS, GDPR, EU DORA
ISO22301, ISO27301, BCI GPG, ITIL, COBIT etc
Analysis of impact of loss over time, criticality of processes, and resources to recover
Potential threats and their probability, any existing mitigation measures
Decide how to deal with the threats and meet business recovery requirements
Co-ordinate teams across cultures and time zones (Americas, EMEIA, and Asia)
Bridge from Board level (CEO, CFO, CIO and CRO) down to team level
Prepare.
Build the PLANS, SOLUTIONS & tools to prepare against the threats
Including cyber incident response playbooks (ransomware etc), crisis management plans, business continuity plans, and IT recovery plans
Including work area recovery sites, dual data centres, replicated data, and cloud services
Including business continuity planning and mass notification tools
Validate whether plans, solutions and tools meet business recovery requirements (including technical tests, desktop rehearsals, call cascades and live tests)
RFIs and RFPs for selection of new third party services including tools, data centres, work area recovery sites, and cloud services
Relationships with third party suppliers of outsourcing and recovery services
Thrive.
Have the confidence to make your business thrive in the present and the future
Dealing with incidents with ease gives you confidence - you can handle the worst - that carries over to your day to day