You increase in size through international growth and acquisition and needed to ensure you had a handle on the potential cyber risks to your data, your business. THIMPL strategy designed an innovative methodology based around the client’s information security policy. It covered a broad scope of information security principles, processes and practices. The methodology assessed the maturity of every control within scope and identified any weaknesses or vulnerabilities. THIMPL strategy teams were comprised of individuals with broad expertise, ensuring suitable cyber review of both associated business processes and technical controls. The quality of output, added value and insight provided has allowed the client to understand the state of cyber security across its organization, and is now directly helping to shape the future of cyber security.
THIMPL strategy’s objectives :
EARN YOUR TRUST / UNDERSTAND YOUR BUSINESS / RIGHT TEAM / VALUE ADDED / PRIVACY WORKING
FIRST – Understanding your context to assess Cyber threat
Cyber security comprises potential threats not just to areas such as data and systems in Government and businesses, but also to critical infrastructure (which includes: communications, emergency services, energy, finance, food, government and public services, health, transport and water).
SECOND – Conducting a Cyber risk assessment
Run a risk cartography, perform business impact assessments and create current and target Cyber Profile.
THIRD – Meet the objective
Determine, analyse, and prioritise gaps. Identify resources and department(s) to apply recommendations, identify areas of potential cooperation with external parties.
FOURTH – Knowledge transfer
Recommend next steps and ensure an effective knowledge transfer on teams.