top of page
What we do
![Strategic-Advisory.png](https://static.wixstatic.com/media/6de888_71b3b844ffae40cd87ae0d39e2497b29~mv2.png/v1/fill/w_80,h_80,al_c,q_85,blur_3,enc_avif,quality_auto/Strategic-Advisory.png)
Strategic Advisory
>Security Strategy
>Roadmap Development
>VCISO
>Cyber Supply Chain Risk
![Risk-Assessment.png](https://static.wixstatic.com/media/6de888_c26b09f380134d01898bcd8e2fdf6415~mv2.png/v1/crop/x_0,y_0,w_80,h_79/fill/w_86,h_85,al_c,lg_1,q_85,blur_3,enc_avif,quality_auto/Risk-Assessment.png)
Program development
>Security Design & Architect
>Governance & Risk
>Compliance Alignment
![Program-Development.png](https://static.wixstatic.com/media/6de888_370fd16d9a5c41039c824751fb48bfec~mv2.png/v1/fill/w_76,h_76,al_c,q_85,usm_0.66_1.00_0.01,blur_3,enc_avif,quality_auto/Program-Development.png)
Risk Assessment
>Vulnerability Assessment
>Penetration Testing
>Application Assessment
>Risk Assessment
>Compliance Gap Assessment
bottom of page