BHConsulting. Your trusted cybersecurity partner

Similar documents
BHConsulting. Your trusted cybersecurity partner

Security Awareness Training Courses

EU General Data Protection Regulation (GDPR) Achieving compliance

Data Sheet The PCI DSS

The GDPR Are you ready?

SRM Service Guide. Smart Security. Smart Compliance. Service Guide

Global Security Consulting Services, compliancy and risk asessment services

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Manchester Metropolitan University Information Security Strategy

locuz.com SOC Services

SPECIALIST CYBER SECURITY SERVICES & CYBER VULNERABILITY HEALTH CHECK FOR SMALLER COMPANIES

Department of Management Services REQUEST FOR INFORMATION

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

HCL GRC IT AUDIT & ASSURANCE SERVICES

GDPR: A QUICK OVERVIEW

Helping you understand the impact of GDPR.

CYBER SECURITY TRAINING

PROTECT YOUR DATA AND PREPARE FOR THE EUROPEAN GENERAL DATA PROTECTION REGULATION

CYBER INSURANCE: MANAGING THE RISK

Digital Health Cyber Security Centre

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

Your Trusted Partner in Europe European Business Reliance Centre

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

TRULY INDEPENDENT CYBER SECURITY SPECIALISTS. Cyber Major

Big data privacy in Australia

CYBER RESILIENCE & INCIDENT RESPONSE

Suma Soft s IT Risk & Security Management Solutions for Global Enterprises

Accelerate Your Enterprise Private Cloud Initiative

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

Run the business. Not the risks.

Cyber Security Program

Vulnerability Assessments and Penetration Testing

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements

Sage Data Security Services Directory

Challenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9

Cybersecurity Protecting your crown jewels

BUILT FOR THE STORM. AND THE NORM.

BUILD YOUR CYBERSECURITY SKILLS WITH TRASYS INTERNATIONAL

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach

How icims Supports. Your Readiness for the European Union General Data Protection Regulation

Bradford J. Willke. 19 September 2007

FOR FINANCIAL SERVICES ORGANIZATIONS

RUAG Cyber Security Understand Cyber. Protect Values.

CISO MASTERCLASS FOR SENIOR EXECUTIVES 2 DAYS

ISE North America Leadership Summit and Awards

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Cybersecurity The Evolving Landscape

Wolfpack Cyber Academy Training Catalogue

SWIFT Customer Security Programme

Building the trust to succeed in digital business

Data Management and Security in the GDPR Era

Sirius Security Overview

ISO 27001:2013 certification

NYDFS Cybersecurity Regulations

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

falanx Cyber ISO 27001: How and why your organisation should get certified

Background FAST FACTS

Toughen Your Security Posture: Cyber Consulting that Keeps You On Track.

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS

Incident Response Services

Governance, Organisation, Law, Regulation and Standards Syllabus QAN 603/0855/2

Protecting your data. EY s approach to data privacy and information security

Fintech District. The First Testing Cyber Security Platform. In collaboration with CISCO. Cloud or On Premise Platform

CyberSecurity. Penetration Testing. Penetration Testing. Contact one of our specialists for more information CYBERSECURITY SERVICE DATASHEET

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Data Security Standards

EY s Data Privacy Services. January 2019

Cyber Risks in the Boardroom Conference

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Are we breached? Deloitte's Cyber Threat Hunting

Continuous protection to reduce risk and maintain production availability

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

SECURITY SERVICES SECURITY

The HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information

Best Practices in Securing a Multicloud World

T-SURE VIGILANCE CYBER SECURITY OPERATIONS CENTRE

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

HITRUST CSF Assurance Program HITRUST, Frisco, TX. All Rights Reserved.

to Enhance Your Cyber Security Needs

TRUE SECURITY-AS-A-SERVICE

SOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

DFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

Conducting a data flow mapping exercise under the GDPR. Presented by: Alan Calder, founder and executive chairman, IT Governance 4 October 2017

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS

WA Govt Changing Cyber Security Landscape

EY s data privacy service offering

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification

Turning Risk into Advantage

Position Title: IT Security Specialist

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

Security

M a d. Take control of your digital security. Advisory & Audit Security Testing Certification Services Training & Awareness

Transcription:

Your trusted cybersecurity partner

BH Consulting Securing your business

BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised internationally as a leader in cybersecurity by both Kennedy Consulting Research & Advisory and SC Magazine, BH Consulting enables organisations to operate more effectively and manage their cyber risks.

Our clients trust us National and international clients in the private, public, and not-for-profit sectors trust BH Consulting to improve their security posture. We have found BH Consulting to be one of the highest-calibre cybersecurity firms in the market. Their tremendous knowledge of the cyber landscape has enabled us to mature far more rapidly than we had planned and has enabled us to successfully grow our programme at a very aggressive rate. They bring extraordinary value to our cybersecurity programme. Bob Jamieson, EdD, CISSP, Chief Information Security and Privacy Officer, Mallinckrodt Pharmaceuticals

Our services at a glance BH Consulting offers a range of information security services, from consulting and strategy to incident response and training.

Consulting ISO 27001 GDPR Risk Forensics Training Services GRC Cybersecurity Policies ISO 27001 Gap Analysis Readiness Assessment ISO 27001 Assessment Computer Security Awareness CSO as a Service Objective Setting Cloud Security Cybersecurity Strategy Information Governance & Compliance Cyber Incident Response and Forensics Data protection and EU GDPR PCI DSS Consulting Business Continuity ISO 27001 Implementation ISO 27001 Assessment ISO 27001 Audit ISO 27001 Risk Assessment ISO 27001 Policies ISO 27001 Training Compliance Planning Incident Response Plans ISO 27001 for GDPR Privacy Impact Assessments Awareness Training Cybersecurity Assessment Vulnerability Assesment Penetration Testing Social Engineering Assessment Business Continuity Management Assessment Red Team Assessment Training Mobile Cloud e-discovery Training Cloud Security ISO 27001 Incident Response Training Digital Forensics Data Protection Training Securing The Human Programme Secure Application Development DPO as a Service Cloud Forensics as a Service Cybersecurity Resourcing Red Team Assessment Risk Identification Implementation Services Compliance Assessment Training Security Awareness Risk Assessment Training

Cybersecurity consulting Security aligned with your business goals

BH Consulting can unlock an information security strategy that aligns with an organisation s current and future objectives. Cybersecurity policies Cloud Security Cybersecurity strategy Information governance and compliance Cyber incident response and forensics Data protection and GDPR PCI DSS consulting Business continuity Security awareness Risk assessment

ISO 27001 services Setting the standard in achieving information security best practice

Whether an organisation needs to measure its current information security practices against the ISO 27001 standard, or achieve certification to the standard, BH Consulting can provide expert guidance on: ISO 27001 gap analysis ISO 27001 implementation ISO 27001 assessment ISO 27001 audit ISO 27001 training ISO 27001 Risk assessment ISO 27001 policies

GDPR Demystifying your compliance requirements

BH Consulting has long-standing experience in the field of data protection and is recognised internationally as an expert provider in this area. We advise organisations on best practice to ensure ongoing compliance with EU General Data Protection Regulation (GDPR). Readiness assessment and gap analysis Compliance planning and consulting Developing data breach or incident response plans Implementing ISO 27001 to help GDPR preparation Privacy impact assessments Awareness training

Cyber risk assessment Assess and advise: a risk-based approach to information security

BH Consulting identifies and evaluates the cyber risks to an organisation s security infrastructure and advises on managing and mitigating those risks. Our risk assessment services include: ISO 27001 assessment Cybersecurity assessment Vulnerability assessment Penetration testing Social engineering assessment Business continuity assessment Red team assessment

Forensics Plot a path through the fog with forensics

BH Consulting can provide an organisation with the expertise, experience, and proven methodologies to help trace a security breach, or to conduct a digital forensics investigation. Our digital forensics expertise covers: Computer forensics Mobile forensics Cloud forensics E-discovery Forensics training

Training and awareness Protection through people, empowered to understand

Address your organisation s information security requirements at source: your people. BH Consulting provides expert training ranging from technical security education to general security awareness programmes, including: Security awareness Cloud security ISO 27001 Incident response training Digital forensics Data protection training Securing The Human programme Secure application development

Cybersecurity as a service Professional resourcing to meet organisations security and data protection needs

A rapid, cost-effective way to access the expertise and knowledge of experienced professionals who can oversee the security and protection of your business. BH Consulting offers: CSO as a service DPO as a service Cloud forensics as a service Cybersecurity resourcing Red team assessment

GRC Governance, risk and compliance, providing assurance where it matters

BH Consulting s comprehensive GRC offering enables clients to meet legal and regulatory obligations and maintain internal security policies in a coordinated way. The service covers: Objective setting Risk identification Implementation services Assessing current compliance Integration of processes with relevant regulations

Your trusted cybersecurity partner Address: The LINC Centre, Blanchardstown Road North, Dublin 15, Ireland Phone: +353 (0)1 4404065 +353 (0)1 4404066 +353 (0)76 6708344 Web: www.bhconsulting.ie Email: info@bhconsulting.ie