Legal, consulting, project leadership and know-how hub. Based in Sandvika, Norway.
Security needs to be managed and information security threats have to be recognized, understood, prevented, discovered, mitigated and contained. NRD Cyber Security security management services assist organizations in establishing their own information security management systems or enables them to outsource professional security management services.
Information Security Management
Exclusive reliance on security technologies cannot guarantee the security of information. In order to consciously manage information security, you have to have mechanisms and processes in place to adequately and proportionately treat information security.
Our team of security experts will help you to establish a practical and doable information security management framework based on ISO 27001, ISO 22301 standard, COBIT 5 frameworks or CIS Critical Security controls.
HOW WE DO IT?
- Assessment of external compliance requirements;
- Establishment of current state of information security management;
- Definition of information security risk assessment methodology;
- Performance of information security risk assessment;
- Development of risk treatment plan;
- Selection of the most proper information security management standard/ framework for your company;
- Implementation of required security controls;
- Drafting of necessary policies and procedures;
- Support and oversight in certification process.
- Security investments proportionate to security risks;
- Continuity of critical business process ensured;
- Security management goals are aligned with business needs;
- Effective incident handling established;
- Competitive advantage.
Contact Romualdas Lečickis at rl@scdrnlt or +370 612 73994 for more information.
Security Operating Center (SOC) Services
Organizations and businesses face threats that are advanced in their complexity and target critical assets. Advanced threat monitoring services will help you to successfully anticipate and address these threats.
Our security operating center (SOC) monitors the network for security events, analyses them and detects specific situations that may pose a threat to your organization.
HOW WE DO IT?
- Advanced security event sensor solutions to ensure cyber event visibility and timely response;
- Network monitoring for anomalies and security events;
- Provision of cyber threat intelligence information to improve the agility of computer network defence mechanisms;
- Adoption of security analysis tools to identify threats to organization’s integral security;
- Detection and recording of organisation-specific security events;
- Invoking of incident handling procedures;
- Forensics operations to perform deep inspection of media and network traffic with the aim to identify malicious intent activities.
- Security incidents are detected at early stage before the major losses are incurred;
- Increased value of information security infrastructure by maximizing visibility of suspicious activities and anomalies;
- Thorough monitoring expands ability to mitigate cyber security threats.