top of page
Original.png
Artboard%25201_edited_edited_edited.png

Cyber-attacks are one of the greatest threats an organisation can face.

 

Alongside the security of an organisations people, its property, and premises, a converged approach to security should consider the risks attached to operating online, identify the vulnerabilities that exist within systems, effectively treat and mitigate threats, and consider innovative ways to gather intelligence, manage risks and target harden infrastructure. This is essential if organisations are to operate online and to conduct transactions securely.

​

​

pexels-lee-campbell-115655.jpg

 

​

​

​

ERG works with you to design and implement an information security management system (ISMS), designed to manage sensitive company information, so that it remains secure. It considers the risks attached to people, processes and IT systems. The security metrics generated can provide insights regarding the effectiveness of an ISMS, can offer a means of communicating the state of an organisation’s cyber-risk posture, increase accountability and provide evidence that an organisation is meeting the requirements of ISO/IEC 27001, as well as applicable laws, rules and regulations.

 

In accordance with the philosophy of the MITRE ATT&CK model, at ERG we believe that offense is often the best form of defence. We can empower security teams to effectively respond to cyber intelligence through the design and delivery of scenario testing and we know that an organisations ability to detect and to stop an attack is improved if it incorporates an on-going exercise programme between attack (red) and defence (blue) teams

The ISO/IEC 27000 family of standards helps organisations keep information assets secure. This family of standards assists organisations in designing and implementing systems, which manage the security of assets such as financial information, intellectual property, employee details or information entrusted to you by third parties.

​

​

​

 

pexels-cottonbro-5483149.jpg
aaron-huber-oMOx_wV6mLQ-unsplash.jpg
suhyeon-choi--OOiHUFNry8-unsplash_edited

CybPro Assurance 

The CybPro assessment will help you to;

​

  • Understand your Cyber threats and the need to protect against Cyber attack

  • Identify key threats to your business network

  • Identify your vulnerabilities

  • Understand the CybPro Model

  • Measure your cybersecurity capability against other organisations and industry best practice

  • Implement appropriate security systems

  • Test your organisation’s ability to withstand common cyberattacks

pexels-lee-campbell-115655.jpg
Threat Hunting

Threat hunting seeks to uncover the presence of attacker tactics, techniques and procedures (TTP) within an environment not already discovered by existing detection technologies.

  • Facebook
  • Twitter
pexels-pixabay-159299.jpg
Incident Response

An incident response plan aims to reduce damage and to recover as quickly as possible.

pexels-pixabay-267507.jpg
Cyber Threat
Intelligence

Threat intelligence is information an organisation uses to understand current threats.  This information is used to prepare, prevent, and protect against cyber threats looking to take advantage of valuable resources. 

  • Facebook
  • Twitter
pexels-christina-morillo-1181210.jpg
Investigations

Applies tactics, techniques, and procedures for a full range of investigative tools and processes. Appropriately balances the benefits of prosecution versus intelligence gathering.

pexels-tranmautritam-226172.jpg
Red Teaming

 A systematic process of probing for vulnerabilities in your systems, networks and applications.

The red teaming report can then inform your choice of cyber security controls.

bottom of page