Cyber Security and Data Privacy Acumin Specialist Cloud Services



Similar documents
Specialist Cloud Services. Acumin Cloud Security Resourcing

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement.

G-Cloud III Services Service Definition Accenture Cloud Security Services

CYBER SECURITY TRAINING SAFE AND SECURE

developing your potential Cyber Security Training

Mitigating and managing cyber risk: ten issues to consider

DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES

CYBER RISK SECURITY, NETWORK & PRIVACY

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

Cyber Security - What Would a Breach Really Mean for your Business?

PCL2\ \1 CYBER RISKS: RISK MANAGEMENT STRATEGIES

Michelle Govan & Anand Philip Network & Security Engineering

Data Protection and Information Security. Procedure for reporting a breach of data security. April 2013

DATA ANALYTICS SERVICES. G-CLOUD SERVICE DEFINITION.

CBEST FAQ February 2015

CESG Certification of Cyber Security Training Courses

Application Guidance CCP Penetration Tester Role, Practitioner Level

Address C-level Cybersecurity issues to enable and secure Digital transformation

February 2015 Issue No: 5.2. CESG Certification for IA Professionals

HMG Security Policy Framework

Overview. Service Description: BCP & DR Strategy (L6)

Cybercrime: risks, penalties and prevention

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

G-Cloud IV Services Service Definition Accenture Cloud Security Services

Cloud Infrastructure Security Management

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

A HELPING HAND TO PROTECT YOUR REPUTATION

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

ediscovery G-Cloud V Service Definition Lot 4 SCS Contact us: Danielle Pratt Tel: G-Cloud@esynergy-solutions.co.

Embrace the G-Cloud. Ultra Secure Colocation Services for the Public Sector. thebunker.net Phone: Fax:

Cyber Liability Insurance

Career Analysis into Cyber Security: New & Evolving Occupations

2015 INFORMATION SECURITY BREACHES SURVEY

The promise and pitfalls of cyber insurance January 2016

Committees Date: Subject: Public Report of: For Information Summary

Government Procurement Service

IT Security Testing Services

ISO Information Security Management Services (Lot 4)

Security Risk Management Strategy in a Mobile and Consumerised World

BT Assure Threat Intelligence

Digital Forensics G-Cloud Service Definition

Cloud Sourcing G-Cloud 5 Framework

January 2015 Issue No: 2.1. Guidance to CESG Certification for IA Professionals

Allianz Global Corporate & Specialty. Cyber Risks. Recent Trends. AIRMIC 15 th June 2015

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

April 2015 Issue No:1.0. Application Guidance - CCP Security and Information Risk Advisor Role, Practitioner Level

The enemies ashore Vulnerabilities & hackers: A relationship that works

IT Security Management 100 Success Secrets

Small businesses: What you need to know about cyber security

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

SCOTTISH CENSUS INDEPENDENT SECURITY REVIEW REPORT

Information security due diligence

Assurance in the Cloud: Outsourcing Risk in a Shifting Landscape

Professional indemnity Summary of cover

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison

INSIGHTS. Are some services too important to outsource? Service Integration & Management (SIAM)

Cyber/ Network Security. FINEX Global

The Next Generation of Security Leaders

UK Data Risks Incident RoadMap

Fiduciary Management. What is Fiduciary Management?

Roles & Grades Rate Cards and Applicable SFIA Skills

IT Managed Services National (Cat A) Framework

Secure by design: taking a strategic approach to cybersecurity

CESG Certified Professional

A Guide to the Cyber Essentials Scheme

Assuria from ZeroDayLab

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

Protecting your business interests through intelligent IT security services, consultancy and training

ESKISP Direct security testing

Access Governance. Delivering value. What you gain. Putting a project back on track for success

Smart Security. Smart Compliance.

School of Computing and Technology

Digital Industries Apprenticeship: Assessment Plan. Cyber Security Technologist. April 2016

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Transcription:

Cyber Security and Data Privacy Acumin Specialist Cloud Services Cloud Security Resourcing Information Assurance and Cyber Security Governance, Risk and Compliance Traditional Security and Business Continuity Acumin provide cost effective, data privacy and information assurance consultancy services to help you address compliance and governance issues relating to the protection of data. Acumin provide a viable alternative to bodyshops and IT outsourcers and offer a broader reach to better skills to help you reduce risk and achieve compliance in a landscape of increased risk.

Direct access to over 35 00 UK Information Security and Data Privacy Associates SC and DV Cleared Approved Consultants Fixed Term Interim Management - High-level HMG data privacy policy reviews - Enterprise Security and Privacy Architecture - Business Continuity Management Information Assurance and Security Policy - CLAS Consultants - Compliance and IT Control Managers - Information Security and Risk Management Technical Project Resources - Project Management - Cloud Security Implementation - Short-long term technical resource Incident Response - Post-event forensic and investigation leadership

Cloud Computing Same Data, New Risks New legislation gives the ICO the power to impose substantial fines on organisations that deliberately or recklessly commit serious breaches of the Data Protection Act. The use of cloud solutions brings new risks to data handling. Consultants with specific cloud security knowledge Identity and access management associates Incident response and remediation As a utility business providing critical services to UK Government and PLC, we take security very seriously, so utilising new technologies such as Cloud based systems is a complex matter. Acumin has been a safe pair of hands for many years, providing much needed contractor expertise in the Cyber Security and Compliance arena. For Centrica, Acumin have resourced teams of individuals, at an advisory and technical level to ensure we mitigate risks of storing, accessing and handling protected data, Head of Information Security British Gas Centrica

Data Protection Compliance Understand your organisation s legal risks surrounding data protection and how to achieve compliance? Some practical measures you can take to protect personal data and mitigate significant legal exposure. Provide Interim data protection legal professionals Provide hands-on Data Protection Act framework experts

PrivacyBy Design The ICO guidelines demand senior management buy-in through to sustainable technical architecture to embed security within the systems you use. Confidence in who you choose to deliver this advice is of paramount importance! Acumin works closely with security accreditation bodies such as (ISC) 2 to ensure you have access to appropriately trained and accredited data privacy professionals. Holistic Information Risk and Assurance Professionals ICO Privacy Impact Assessment Consultants Privacy awareness experts to sell at C-Level Policy and technical security architecture consultants Project Managers Application Penetration Testing Associates Over 1700 CISSP qualified people in the UK

Government Connect The drive continues to share personal information across the secure government networks but these initiatives hold significant compliance issues. Navigating the Code of Connection will be vital to achieving compliance and maintaining data privacy. Experts in NHS, MoD, MoJ, Police, HMRC Industry specific CLAS consultants GCSx specific expertise Infrastructure Security Architects I didn t feel comfortable using anyone else, I know they re specialists within the security market and they are professional, honest and very responsive. I would not hesitate to recommend Acumin to anyone who is either looking for work, or looking to recruit staff. Technical Security Architect, Contractor for a leading Airport Authority

Taking Action in a Recession Pressure continues to be applied to reduce costs on both technology and consultancy in the wake of the recession. Acumin s Cloud Security Resourcing Service allows your organisation to make huge savings on project resource and interim data privacy management whilst not neglecting the need to ensure compliance. Savings of between 15% and 50% on day rates Flexibility and elasticity UK-wide coverage Partners with (ISC) 2, CREST and The IISP

Improving Public Data Privacy Acumin Consulting Limited Suite 22, Beaufort Court, Admirals Way, London E14 9XL Telephone: +44 (0)207 987 3838 Email: info@acumin.co.uk Web: www.acumin.co.uk