ISO27001 Implementation & Consulting

Design and implement a comprehensive Information Security Management System (ISMS) that can be certified to ISO27001.  Alternatively, implement specific modules of such a program such as:

  • Information Security Policy
  • Business Continuity & Disaster Recovery
  • Threat & Vulnerability Assessments
  • Risk Assessments

Disaster Recovery, Business Continuity & Resumption Services

Design and implement a comprehensive DR or BCP Strategy.  Execution of structured:

  • business process mapping and dependency identification
  • information asset register creation
  • threat and vulnerability assessment
  • business impact analysis and control selection
  • testing strategy design and planning

Attack & Penetration and Vulnerability Assessment

We use internationally recognised methodologies and execution approaches for:

  • external attack simulation
  • internal penetration testing
  • social engineering procedures
  • wireless penetration and
  • application-specific testing

IT Security Strategy Design

Defining an effective IT strategy is a challenge in itself.  Ensuring that it is aligned to the business’ needs and strategies is a task that can not be underestimated or left to chance.

With demonstrable experience and numerous projects for reputable organisations in several industries, PhoenixPro works with you to define a comprehensive approach to your technology, applications and systems for a planning horizon of 3 - 5 years or more