CGuards consultants are keen to assist clients in establishing, developing, managing and complying with national and international Privacy, Information and Cyber Security regulations, instructions, standards and frameworks:
· ISMS – ISO 27001 & NIST
· BCMS – ISO 22301 & GPG
· ITSMS – ISO 20000 & ITIL
· CS Risk Assessment
· CS Policies and Procedures
· IT Governance – COBIT
· Swift IAF, CSP & SIP
· Privacy – GDPR
· CBJ Cybersecurity Instructions
· SAMA Cybersecurity Frameworks
· SAMA Business Continuity Management (BCM) Framework
· NCA – ECC & CSCC
Cyber Zones | A&C Unit uniquely focus on best security practices to ensure that our clients follows the world class best security practices. Cyber Zones | A&C Unit aims to gather information regarding the current security standards and procedures for customers Infrastructure. It includes Security Architecture auditing that will attempt to check the current security configuration within customers Infrastructure. System Classification Service which includes Classifying all servers, PC’s, security and Network devices on customers infrastructure to one of three main levels:
· Level 1 (Critical Systems).
· Level 2 (Important Systems).
· Level 3 (Regular Systems).
A&C Unit offers the following services:
Low Level Architecture auditing aims to gather detailed information regarding each security device in the registered scope, LLA includes getting the configuration file for each device in the scope and analyze it manually to detect any mis-configuration or overlooked items within the configuration, a configuration document will be generated which contains the current configuration and possible breach an attacker may conduct, however, these policies will be tested during the penetration testing service, thus, LLA is highly recommended to be included in order to conduct the PT service in planned manner.
Cyber Zones believes that SOC should be oriented around multiple areas, Our highly qualified consultant team participate in building one of the first SOCs and has successfully continued to build on that experience for over a decade evaluating and building SOCs.
Cyber Zones can help on the development of Security Operation Center as well as providing the SOC training package to your employees.
Designed to educate users on the appropriate use, protection and security of information, individual user responsibilities and ongoing maintenance necessary to protect the Confidentiality, Integrity, Availability, Accountability and non-repudiation of information assets, resources and systems from unauthorized access, misuse, disclosure, destruction, modification, or disruption.
Cyber Zones developed a unique set of security awareness training (for executives and regular users) and newsletters with catchy images and unique slogans which will attract the attention of end users and assist in establishing a proper security environment within the organization, this service focus on develop a sense about the important on security and complying with security standard and procedures.
Security Policies and Procedures instruct users, employees and partners on how to use customers’ assets and resources on a secure and responsible way. Security policy addresses constraints on functions and flow among them, constraints on access by external systems and adversaries including programs and access to data by people.