ISO 27001 Implementation
Complete ISO 27001:2022 programmes from gap analysis through certification support. Includes ISMS design, risk assessment, Statement of Applicability, policy suite, control implementation, internal audit and stage 1 & 2 audit preparation.
- Gap analysis & scoping
- ISMS & risk register
- Control implementation (Annex A)
- Internal audit & management review
- Certification body liaison
- Ongoing ISMS maintenance support
SOC 2 Readiness & Audit Support
SOC 2 Type I and Type II readiness, control design and audit support aligned with AICPA Trust Services Criteria. From scope definition and control mapping to evidence collection, audit liaison and remediation.
- Trust Services Criteria mapping
- Control design & implementation
- Evidence automation & collection
- Auditor liaison & remediation
- Readiness reporting
- Type II continuous monitoring
PCI DSS Compliance
PCI DSS v4.0 readiness assessments, gap analysis and remediation for merchants and service providers. Scope reduction strategies, network segmentation review, ASV scan management and Self-Assessment Questionnaire (SAQ) support.
- Scope definition & reduction
- Gap analysis & remediation plan
- Segmentation & CDE review
- SAQ & RoC preparation
- ASV & QSA liaison
- Ongoing compliance maintenance
GDPR & Data Protection
End-to-end GDPR compliance programmes including data mapping, DPIAs, privacy policy engineering, data processor agreements, breach response procedures and Data Protection Officer (DPO) as-a-service for UK and EU operations.
- Data mapping & ROPA
- DPIA & LIA execution
- Privacy notice engineering
- DPO-as-a-Service
- Data subject request handling
- International transfer assessment
HIPAA Compliance Services
HIPAA Security Rule, Privacy Rule and Breach Notification Rule implementation for covered entities and business associates. Includes risk analysis, safeguards implementation, Business Associate Agreements and incident response planning.
- Security Rule risk analysis
- Technical, physical & administrative safeguards
- BAA review & drafting
- Breach notification procedures
- Workforce training programme
- HITRUST readiness mapping
Third-Party Risk Management
Vendor due diligence and continuous third-party risk monitoring programmes. Questionnaire automation, risk scoring, evidence review and ongoing monitoring to ensure your supply chain meets your security and compliance requirements.
- Vendor inventory & tiering
- Due diligence questionnaires
- Continuous monitoring
- Remediation & contract support
- Fourth-party risk mapping
- Board-level reporting
Cybersecurity Risk Assessment
Business-aligned cybersecurity risk assessments using NIST 800-30, ISO 27005 or FAIR methodologies. Delivers a quantified risk register, treatment plans, board-ready reporting and clear prioritisation of security investment.
- Qualitative & quantitative methods
- Threat modelling workshops
- Risk register & treatment plan
- Board & committee reporting
- FAIR-based loss quantification
- Security roadmap prioritisation
Virtual CISO (vCISO) Advisory
Fractional Chief Information Security Officer engagement providing strategic security leadership, board reporting, roadmap development, budget planning and ongoing programme management, ideal for scaling companies without a full-time CISO.
- Security strategy & roadmap
- Board & executive reporting
- Budget & vendor management
- Team hiring & mentoring
- Customer security questionnaires
- M&A security due diligence