Defining your Security Framework is often overlooked when transforming your business. recon assists organisations in defining the security framework for your environment to be used for now and into the future.

Building security into all aspects of your business is complex. The larger your business, the greater the complexity. recon‘s cyber maturity program assists enterprise businesses by building maturity as your business and culture develop.

PRACTICES

We utilise practices from NIST1The National Institute of Standards and Technology is a physical sciences laboratory and non-regulatory agency of the United States Department of Commerce. Its mission is to promote American innovation and industrial competitiveness., ISO2The International Organization for Standardization is an international standard-setting body composed of representatives from various national standards organizations. Founded on 23 February 1947, the organization develops and publishes worldwide technical, industrial and commercial standards., TOGAF3TOGAF is an enterprise architecture framework that helps define business goals and align them with architecture objectives around enterprise software development. … The Open Group developed TOGAF in 1995, and in 2016, 80 percent of Global 50 companies and 60 percent of Fortune 500 companies used the framework. and ASD4Australian Signals Directorate is the Australian government agency responsible for foreign signals intelligence, support to military operations, cyber warfare, and information security. ASD is part of the Australian Intelligence Community. ASD’s role within UKUSA Agreement is to monitor SIGINT in South and East Asia. embedded in our security  development programs and incorporate detailed training and development strategies to ensure your maturity is constantly progressing.

SERVICE

Security maturity development

cyber consulting services

Security maturity development

Security maturity development

Infrastructure security health

Infrastructure security health

Technology assessment + adoption

Technology assessment + adoption

ISO 27001/02 – Readiness Assessment

ISO 27001/02 – Readiness Assessment

Architecture design

Architecture design

Risk management

Risk management

Post breach forensics

Post breach forensics

vCISO

vCISO