CYBER SECURITY

Here at Diligent Specialist Services, protection of data is the key.
With your systems, networks and programs we keep your 
Confidentiality and integrity protected from threats and cyberattacks.

KEEP YOUR DATA SAFE

Govern

Protect

Detect

Respond

Payment Card Industry, Data Security Standard

(PCI DSS) Consultancy

Rulesets Quarterly Reviews, CDE Scoping exercise, PCI DSS gap analysis, Best Practices advisory

Cyber Security Advisory Services

Virtual Chief Information Security Officer
Consultancy service - vCISO services
  • Review and identify cyber control gaps for e.g.
    Data Loss Prevention (DLP), Distributed Denial of Service (DDoS) protection and, provide suggestions to improve resilience.
  • Develop information security governance artefacts addressing policy/procedure gaps in relation to DDoS
  • Work with client CISOs, develop enterprise security architecture for private and public organisations
  • Establish continuous logging and monitoring processes for UK public and private sector organisations
  • Provide cyber security control gaps, risk assessments and remediation plans to improve controls maturity 

Cyber Security Reviews -
Cloud and On-premises Infrastructure security assessment

Conduct multiple Cyber Security Controls Maturity assessments against CIS CSC 20 Domain Controls

Conduct multiple Cyber Security Controls Maturity assessments against NIST CSF

Conduct multiple pre-ISO 27001 ISMS certification reviews in readiness for certification

Develop, track and support client remediation efforts following cyber security controls assessments

Manage client relationships, provide advisory services supporting compliance and business as usual (BAU)

Enterprise Security Architecture (ESA) Development,
Review and Advisory services

Review current enterprise security architecture to identify security challenges and gaps 

Plan workshops and engagement meetings with client stakeholders and, developed project plans

Liaise with business unit leaders to gather and refine requirements, and to ensure buy-in

Liaise with solutions architecture, IT Security, IT and Network Operations team members to coordinate tasks

Refine and develop ESA and supporting collaterals/artefacts documenting current and future design 

Network Security Review - Reviewed security design
of ‘fabric’ network supporting private cloud infrastructure