X

Government Advisory

We offer governments strategic consulting on cyber security, and can help design and implement infrastructure to protect national and local governments, enabling them to respond to any threats in a proactive manner.

X

National Infrastructure

We can help create robust national infrastructure by providing security frameworks, training and security monitoring, and coordinating security testing with relevant government bodies. Our incident response solutions help contain and address any threats. We can additionally help with proactive techniques such as threat intelligence, helping to thwart attacks before they begin.

X

Heavy Industry

We understand how to protect the industrial control systems and associated infrastructure that heavy industry depends upon, and can design bespoke information security frameworks and provide incident response and recovery solutions.

X

Finance & Legal

Financial institutions are leading targets of cyber-attacks and espionage, offering cyber-criminals multiple avenues for profit through extortion, theft, and fraud. Our solutions for the defence of this sector range from security testing and monitoring through to digital forensics and threat intelligence.

X

Manufacturing

Manufacturing is exposed to many cyber risks including intellectual property theft and counterfeiting of designs by competitors; these can cost huge sums in terms of foregone revenues. Our ‘Risk and Governance’ services help maintain control over research and development activities, our training helps manufacturers understand their risk profile and our security monitoring helps alert companies to any threats.

X

Healthcare

The public disclosure of personal medical records is the primary cyber risk faced by healthcare institutions. We help protect all such sensitive data by means of rigorous security testing and monitoring.

X

Retail & E-Commerce

Famous retail names are under constant threat from direct hacking, denial of service and fraudulent imitation, which costs them or their customers billions of dollars annually. Our solutions enable the creation of secure, monitored and robust transaction infrastructures incorporating testing, monitoring and incident response capabilities.

A global defence company based in Japan protecting national infrastructure and organisations against cyber attack

Nihon cyber DEFENCE

Services

Risk and Governance

Our risk and governance services allow you to set up strong frameworks to minimise your risk of cyber-attack. They include:

  • ISO 27001 Implementation
  • Cyber Essentials
  • Cyber Essentials Plus
  • Virtual CISO
  • Virtual CISO services
  • Senior Executive Cyber Mentoring Programmes
  • Risk assessments
  • Outsource contract risk assessments
  • 3rd party supply chain risk assessments
  • Cloud provider risk assessments
  • Compliance services
  • Security Architect services
Security Framework Training
  • COBIT5 Foundation
  • COBIT5 Practitioner
  • ISO 27001 Foundation
  • ISO 27001 Practitioner
  • European GDPR Foundation
  • European GDPR Practitioner

Five Key Business Benefits

  • Reduces your business cyber risk
  • Helps meet GDPR obligations
  • Enhances your business reputation
  • Is cost effective

Independent Security

Our security testing enables you to find weak points in your systems, enabling you to remedy shortcomings before attackers exploit them. It covers the following areas:

  • IoT Security
  • Attack Surface Baseline (an initial vulnerability assessment with penetration testing) of the following sets or subsets of systems and applications :
  • External Penetration Tests
  • Internal Vulnerability Assessment
  • Wireless Networks
  • Web Applications
  • Mobile Applications
  • Credential Risk Assessment
  • Social Engineering
  • Control Systems (CS)/Industrial Control Systems (ISC)/Supervisory Control and Data Acquisition (SCADA) systems
  • Cybersecurity Assessment
  • Digital Forensics Incident Response (DFIR)
  • Tailored Threat Intelligence (TI)
  • Specific Subject Matter Expertise Support (Cyber Engineering, Cyber Software Development, Secure Software Review, HUNT, Targeted Threat Intelligence, DFIR)
  • Red Team Assessment
  • Breach Assessment
  • Customized cyber solutions integrating all or portions of the services listed above

Security Monitoring

Our network monitoring solution gives you visibility into events within your network enabling you to proactively respond to an incident.

The monitoring platform solves the traditional SIEM problem of ‘event noise’ by using filters and a custom ruleset to provide high quality indicators. Specific attributes are:

  • Minimises false positives
  • Is able to monitor wireless infrastructure
  • Is scalable
  • Available on-Premise or as a Cloud service
  • Network Defense Operations / Traditional Managed Security Services (MSS)
  • Active Adversary Pursuit (HUNT) Operations

The above solutions can be customized and/or combined to meet your organisation’s specific needs

Plus

CYBER COMPASS

It’s hard to know which way is north in the world of cyber; relying on GPS means you often head in the wrong direction.

Our branded Cyber Compass training allows you to map out the precise direction your organization needs to head in order to become cyber-aware and cyber-competent.

Cyber Compass has been designed by a team of experts with real world experience in cyber security.

Please contact us for a full curriculum of Cyber Compass Courses.