Business today constantly has related risks, whether it be operational, management and/or cyber security. Identifying risks before they become a problem is where recon assists.

Whether it be cyber security, or the overall risk associated with ICT, recon has built a library of risk management methodologies to assist organisations in defining practices to identify, assess, mitigate, and resolve risk.  

 

PRACTICES

We utilise practices from NIST1The National Institute of Standards and Technology is a physical sciences laboratory and non-regulatory agency of the United States Department of Commerce. Its mission is to promote American innovation and industrial competitiveness., ISO2The International Organization for Standardization is an international standard-setting body composed of representatives from various national standards organizations. Founded on 23 February 1947, the organization develops and publishes worldwide technical, industrial and commercial standards., TOGAF3TOGAF is an enterprise architecture framework that helps define business goals and align them with architecture objectives around enterprise software development. … The Open Group developed TOGAF in 1995, and in 2016, 80 percent of Global 50 companies and 60 percent of Fortune 500 companies used the framework. and ASD4Australian Signals Directorate is the Australian government agency responsible for foreign signals intelligence, support to military operations, cyber warfare, and information security. ASD is part of the Australian Intelligence Community. ASD’s role within UKUSA Agreement is to monitor SIGINT in South and East Asia. embedded in our security design and architecture incorporating best of breed methodologies.

SERVICE

Risk management

recon risk management services

cyber consulting services

Security maturity development

Security maturity development

Infrastructure security health

Infrastructure security health

Technology assessment + adoption

Technology assessment + adoption

ISO 27001/02 – Readiness Assessment

ISO 27001/02 – Readiness Assessment

Architecture design

Architecture design

Risk management

Risk management

Post breach forensics

Post breach forensics

vCISO

vCISO