Cyber-security

6
X
Security Options / Support Options

  • Fully outsourced treatment implementation.
  • Closely supported treatment implementation.
  • On-demand services.

Each expert consultant holds a minimum of 15 years of experience in cyber-security and is intimately aware of the threat landscape, regulatory requirements and associated compliance processes.

5
X
Security Risk Treatment Plan

Development of an effective Security Risk Treatment Plan (SRTP) really is the key objective of all preceding stages - it’s where the current period of discovery ends and the minimisation of risks begins.

SRTPs are written in consultation with each client to assure their ability to implement each to achieve the best possible outcomes.

4
X
Security Risk Assessment

The SRA a critical step in the development of a Security Risk Treatment Plan, and provides the basis from which to continually review and improve your security risk profile and exposure. Our approach to SRAs has been lauded over many engagements, and our pragmatic advice reflects recommendations that are clearly understood, realistic and cost-beneficial.

3
X
Penetration and Vulnerability Assessment

Depending upon client needs, Agilient’s vulnerability assessments process utilises a tailored combination of best of breed vulnerability tools and scanners to map deficiencies, such as:

  • Nmap.
  • Nessus.
  • SAINT.
  • OpenVAS.
  • INFRA Scan.

Our penetration testing reports provide practical and real- time guidance on how to address specific vulnerabilities in your cyber-security systems and operating environment.

2
X
Risk Controls Assessment

Using the latest datasets, templates and dashboards, this stage involves Agilient undertaking a rigorous review of current cyber-security procedures to determine their level of inherent maturity, alignment with industry best practices or compliance with internal, regulatory or industry published standards.

1
X
Threat Assessment and Monitoring

  • Australian Cyber Security Centre Threat Reporting.
  • ASIO Business Liaison Unit Threat Reporting.
  • US Dept. of Homeland Security Reporting.
  • SANS Institute Threat Reports.
  • US Center for Internet Security.
Contact Agilient