Managing the overall cyber strategy is becoming harder and harder and many businesses do not have the budget or the resources to have a dedicated CISO. Furthermore, many CISO’s have limited exposure to different corporate environments and may benefit from the recon vCISO’s wide experience. 

recon’s vCISO (Virtual Chief Information Security Officer) service provides experienced and proven CISO’s who come from an operational and strategic background. They can assist your organisation with strategies on how to build a cyber maturity program, look at the operational controls and provide clear and concise direction on steps, actions, and related resources to minimise the chances of an attack or breach.

PRACTICES

We utilise practices from NIST1The National Institute of Standards and Technology is a physical sciences laboratory and non-regulatory agency of the United States Department of Commerce. Its mission is to promote American innovation and industrial competitiveness., ISO2The International Organization for Standardization is an international standard-setting body composed of representatives from various national standards organizations. Founded on 23 February 1947, the organization develops and publishes worldwide technical, industrial and commercial standards., TOGAF3TOGAF is an enterprise architecture framework that helps define business goals and align them with architecture objectives around enterprise software development. … The Open Group developed TOGAF in 1995, and in 2016, 80 percent of Global 50 companies and 60 percent of Fortune 500 companies used the framework. and ASD4Australian Signals Directorate is the Australian government agency responsible for foreign signals intelligence, support to military operations, cyber warfare, and information security. ASD is part of the Australian Intelligence Community. ASD’s role within UKUSA Agreement is to monitor SIGINT in South and East Asia. embedded in our security design and architecture incorporating best of breed methodologies.

SERVICE

vCISO services

recon vCISO services

cyber consulting services

Security maturity development

Security maturity development

Infrastructure security health

Infrastructure security health

Technology assessment + adoption

Technology assessment + adoption

ISO 27001/02 – Readiness Assessment

ISO 27001/02 – Readiness Assessment

Architecture design

Architecture design

Risk management

Risk management

Post breach forensics

Post breach forensics

vCISO

vCISO