Our services

Cyber Security Governance

Cybersecurity governance refers to the component of an organization's governance that addresses their dependence on cyberspace in the presence of adversaries, including:

Policies

Procedures

Standards

Strategies

Frameworks

Enterprise Security Architecture

* Based On International Standards (ISO 27001, NIST, ITIL, COBIT2019, etc.) and National Standards (NCA, NESA SAMA, etc.).
Image

Cyber Security Risk Management

Cyber Security Risk Management is a Cyber Security and risk management consultancy. We can help your organisation meet it's Cyber Security challenges, and identifying any gaps in an existing Cyber Security strategy.

  • Conducting Cyber Security Risk Assessment

    Cyber Security risk assessment (referred to as “risk assessment”) is an integral part of an organisation’s enterprise risk management process.

  • Business Impact Assessment

    A business impact analysis (BIA) predicts the consequences of disruption of a business function and process and gathers information needed to develop recovery strategies.

  • Privacy Impact Assessment

    PIA, is an analysis of how personally identifiable information is collected, used, shared, and maintained.

* In Compliance With ISO 31000, 27005, NIST, Etc.
Image

Data Classification

Development of data classification program by implementing data classification, data labeling & handling best practices and provide roadmap to implement classification and data loss prevention. a.

The service includes:

  • Gap Analysis of the current state for data classification, Data governance against National and international Standards.
  • Development of data classification framework (Policies, procedures, etc.)
  • Educate users on how to deal with and protect data.
  • Develop data classification strategy including the technology roadmap for data handling.
  • Auditing and helping organization to comply with (Inter)national Regulations / Standards

    Training and Awareness

    Conducting Cyber Security Awareness Sessions And Training In :

    • ISO 27001
    • ISO 22301 / BCM
    • ISO 20000 / ITIL
    • CS Risk Management
    • Digital Forensic
    • Incident Handling
    • Penetration Testing
    • GDPR
    • Other CS Trainings

    Outsourcing CS / BC/ DPO

    Outsourcing the function of CyberSecurity, Business Continuity or Data Protection Officer by providing the needed resources for the organization through multiple consultants who posses a wide range of experiences.

    Image

    Business Continuity Management

    Development of business continuity program to enhance the organization resilience against business interruptions.

    The service includes:

    Developing Business continuity Framework.

    Developing Business Continuity and Disaster Recovery Plans.


    Developing Business Continuity Strategies.

    Conducting Business Impact Analysis (BIA) and Risk Assessment.

    Image
    Image

    Protect Your Organization

    With our most talented and professional Team, they will handle all security parts in your organization.

    • Red-Teaming
    • Digital Forensic Investigation
    • Web and Mobile PT
    • Vulnerability Assessment
    • Security Configuration Review
    • Source Code Review
    • Security Network Architecture
    • Compromise Assessment
    • Penetration Testing
    Our Serve area

    Industry Expertise

    We at CGuards cover a wide range of Industry Expertise Including the below:

    Banking

    Manufacturing

    Oil and Gas

    Insurance

    Public Services

    Healthcare

    Government

    NGOs

    Airlines

    Financial Institutions

    Education

    Telecoms