BHConsulting. Your trusted cybersecurity partner

Similar documents
BHConsulting. Your trusted cybersecurity partner

Security Awareness Training Courses

EU General Data Protection Regulation (GDPR) Achieving compliance

SRM Service Guide. Smart Security. Smart Compliance. Service Guide

Department of Management Services REQUEST FOR INFORMATION

SPECIALIST CYBER SECURITY SERVICES & CYBER VULNERABILITY HEALTH CHECK FOR SMALLER COMPANIES

Data Sheet The PCI DSS

CYBER SECURITY TRAINING

locuz.com SOC Services

Manchester Metropolitan University Information Security Strategy

The GDPR Are you ready?

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Helping you understand the impact of GDPR.

TRULY INDEPENDENT CYBER SECURITY SPECIALISTS. Cyber Major

HCL GRC IT AUDIT & ASSURANCE SERVICES

Global Security Consulting Services, compliancy and risk asessment services

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements

Sage Data Security Services Directory

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Digital Health Cyber Security Centre

PROTECT YOUR DATA AND PREPARE FOR THE EUROPEAN GENERAL DATA PROTECTION REGULATION

GDPR: A QUICK OVERVIEW

CISO MASTERCLASS FOR SENIOR EXECUTIVES 2 DAYS

Your Trusted Partner in Europe European Business Reliance Centre

CYBER INSURANCE: MANAGING THE RISK

Big data privacy in Australia

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

CYBER RESILIENCE & INCIDENT RESPONSE

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

BUILT FOR THE STORM. AND THE NORM.

TRUE SECURITY-AS-A-SERVICE

to Enhance Your Cyber Security Needs

BUILD YOUR CYBERSECURITY SKILLS WITH TRASYS INTERNATIONAL

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World

Incident Response Services

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

Vulnerability Assessments and Penetration Testing

Run the business. Not the risks.

Governance, Organisation, Law, Regulation and Standards Syllabus QAN 603/0855/2

Challenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

falanx Cyber ISO 27001: How and why your organisation should get certified

ISO 27001:2013 certification

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Turning Risk into Advantage

Cybersecurity Protecting your crown jewels

RUAG Cyber Security Understand Cyber. Protect Values.

NYDFS Cybersecurity Regulations

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach

Suma Soft s IT Risk & Security Management Solutions for Global Enterprises

CyberSecurity. Penetration Testing. Penetration Testing. Contact one of our specialists for more information CYBERSECURITY SERVICE DATASHEET

Bradford J. Willke. 19 September 2007

Accelerate Your Enterprise Private Cloud Initiative

Toughen Your Security Posture: Cyber Consulting that Keeps You On Track.

How icims Supports. Your Readiness for the European Union General Data Protection Regulation

Sirius Security Overview

FOR FINANCIAL SERVICES ORGANIZATIONS

ISE North America Leadership Summit and Awards

Cyber Security Program

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Securing Your Digital Transformation

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

Cybersecurity The Evolving Landscape

Cybersecurity. Securely enabling transformation and change

Cyber, Information Security, and Data Protection

Wolfpack Cyber Academy Training Catalogue

Data Management and Security in the GDPR Era

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS

Background FAST FACTS

Position Title: IT Security Specialist

Are we breached? Deloitte's Cyber Threat Hunting

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Cyber Risks in the Boardroom Conference

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Continuous protection to reduce risk and maintain production availability

Security by Default: Enabling Transformation Through Cyber Resilience

Protecting your data. EY s approach to data privacy and information security

Certified Cyber Security Specialist

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Data Security Standards

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

SECURITY SERVICES SECURITY

Career Paths In Cybersecurity

EY s Data Privacy Services. January 2019

Risk Advisory Academy Training Brochure

Fintech District. The First Testing Cyber Security Platform. In collaboration with CISCO. Cloud or On Premise Platform

SWIFT Customer Security Programme

The HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information

Mohammad Shahadat Hossain

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

T-SURE VIGILANCE CYBER SECURITY OPERATIONS CENTRE

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

Building the trust to succeed in digital business

Google Cloud & the General Data Protection Regulation (GDPR)

Transcription:

Your trusted cybersecurity partner

BH Consulting Securing your business

BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised internationally as a leader in cybersecurity by both Kennedy Consulting Research & Advisory and SC Magazine, BH Consulting enables organisations to operate more effectively and manage their cyber risks.

Our clients trust us National and international clients in the private, public, and not-for-profit sectors trust BH Consulting to improve their security posture. We have found BH Consulting to be one of the highest-calibre cybersecurity firms in the market. Their tremendous knowledge of the cyber landscape has enabled us to mature far more rapidly than we had planned and has enabled us to successfully grow our programme at a very aggressive rate. They bring extraordinary value to our cybersecurity programme. Bob Jamieson, EdD, CISSP, Chief Information Security and Privacy Officer, Mallinckrodt Pharmaceuticals

Our team The BH Consulting team has a wide breadth of knowledge, combining the technical aspects of information security with governance and risk management. Meet some of our team.

Brian Honan CEO Valerie Lyons COO Ian Travers Senior consultant Neha Thethi Cyber consultant and forensics analyst Oxana Sereda Cybersecurity analyst Stephen Rouine Cloud and cyber risk specialist

Our services at a glance BH Consulting offers a range of information security services, from consulting and strategy to incident response and training.

Consulting ISO 27001 Risk Forensics Training Services GRC Cybersecurity Policies ISO 27001 Gap Analysis ISO 27001 Assessment Computer Security Awareness CSO as a Service Objective Setting Cloud Security Cybersecurity Strategy Information Governance & Compliance Cyber Incident Response and Forensics Data protection and EU GDPR PCI DSS Consulting Business Continuity ISO 27001 Implementation ISO 27001 Assessment ISO 27001 Audit ISO 27001 Risk Assessment ISO 27001 Policies ISO 27001 Training Cybersecurity Assessment Vulnerability Assesment Penetration Testing Social Engineering Assessment Business Continuity Management Assessment Red Team Assessment Training Mobile Cloud e-discovery Training Cloud Security ISO 27001 Incident Response Training Digital Forensics Data Protection Training Securing The Human Programme Secure Application Development DPO as a Service Cloud Forensics as a Service Cybersecurity Resourcing Red Team Assessment Risk Identification Implementation Services Compliance Assessment Training Security Awareness Risk Assessment Training

Cybersecurity consulting Security aligned with your business goals

BH Consulting can unlock an information security strategy that aligns with an organisation s current and future objectives. Cybersecurity policies Cloud Security Cybersecurity strategy Information governance and compliance Cyber incident response and forensics Data protection and GDPR PCI DSS consulting Business continuity Security awareness Risk assessment

ISO 27001 services Setting the standard in achieving information security best practice

Whether an organisation needs to measure its current information security practices against the ISO 27001 standard, or achieve certification to the standard, BH Consulting can provide expert guidance on: ISO 27001 gap analysis ISO 27001 implementation ISO 27001 assessment ISO 27001 audit ISO 27001 training ISO 27001 Risk assessment ISO 27001 policies

Cyber risk assessment Assess and advise: a risk-based approach to information security

BH Consulting identifies and evaluates the cyber risks to an organisation s security infrastructure and advises on managing and mitigating those risks. Our risk assessment services include: ISO 27001 assessment Cybersecurity assessment Vulnerability assessment Penetration testing Social engineering assessment Business continuity assessment Red team assessment

Forensics Plot a path through the fog with forensics

BH Consulting can provide an organisation with the expertise, experience, and proven methodologies to help trace a security breach, or to conduct a digital forensics investigation. Our digital forensics expertise covers: Computer forensics Mobile forensics Cloud forensics E-discovery Forensics training

Training and awareness Protection through people, empowered to understand

Address your organisation s information security requirements at source: your people. BH Consulting provides expert training ranging from technical security education to general security awareness programmes, including: Security awareness Cloud security ISO 27001 Incident response training Digital forensics Data protection training Securing The Human programme Secure application development

Cybersecurity as a service Professional resourcing to meet organisations security and data protection needs

A rapid, cost-effective way to access the expertise and knowledge of experienced professionals who can oversee the security and protection of your business. BH Consulting offers: CSO as a service DPO as a service Cloud forensics as a service Cybersecurity resourcing Red team assessment

GRC Governance, risk and compliance, providing assurance where it matters

BH Consulting s comprehensive GRC offering enables clients to meet legal and regulatory obligations and maintain internal security policies in a coordinated way. The service covers: Objective setting Risk identification Implementation services Assessing current compliance Integration of processes with relevant regulations

Your trusted cybersecurity partner Address: The LINC Centre, Blanchardstown Road North, Dublin 15, Ireland Phone: +353 (0)1 4404065 +353 (0)1 4404066 +353 (0)76 6708344 Web: www.bhconsulting.ie Email: info@bhconsulting.ie