Historically, cyber security controls have been an afterthought when deploying/upgrading or updating applications and servers.

Nowadays, customers are asking recon to assist their Application and ICT teams to bake cyber into the build of their operational systems.  

 

PRACTICES

recon assists organisations with defining the appropriate requirements for applications, servers, endpoints and networks. Our expertise expedites the onboarding process by having a clear set of deliverables incorporating cyber security.  

 

SERVICE

Architecture design

recon architecture

cyber consulting services

Security maturity development

Security maturity development

Infrastructure security health

Infrastructure security health

Technology assessment + adoption

Technology assessment + adoption

ISO 27001/02 – Readiness Assessment

ISO 27001/02 – Readiness Assessment

Architecture design

Architecture design

Risk management

Risk management

Post breach forensics

Post breach forensics

vCISO

vCISO