Cyber Security Transition & Optimisation
Our Cyber Security Transformation & Optimisation service ensures that Cyber Security change programmes are delivered effectively, robustly and efficiently. We support the selection and implementation of security tooling to provide a resilient platform. We drive behaviours in the organisation from user awareness programmes, Programme/Project Management and implementation of DevSecOps.
Features
- Cyber Programme/Project Management (IAM, DLP, Cloud, Segmentation, Encryption, Endpoints/Mobiles)
- Business Continuity and Disaster Recovery plan implementation (BCP, DRP)
- Cyber data breach management simulation (operational/regulatory events, cyber-attack)
- Penetration testing and vulnerability management
- Incident Response (CERT, Digital Forensics, cyber investigation services)
- Cyber Security awareness training and behavioural change
- Security tooling optimisation review
Benefits
- Deliver Cyber Security programmes to meet security objectives
- Ensure business and IT continuity in resilient environments
- Able to execute an effective cyber resilience and recovery plan
- Reduce attack surface from adverse threat vectors
- Effectively react,respond, contain, remediate and recover from a cyber attack
- Raise awareness and improve Cyber Security knowledge and skills
- Effective implementation of security policies
Pricing
£550 to £1,950 a person a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 8 7 5 5 9 4 8 8 5 4 4 5 3 4
Contact
WAVESTONE ADVISORS UK LIMITED
Wavestone
Telephone: 020 3002 1760
Email: ukpublicsector@wavestone.com
Planning
- Planning service
- Yes
- How the planning service works
- Our Cyber Security Transformation and Optimisation service provides detailed planning for the implementation of the Cyber Security Strategy. Planning takes into account the current state of play, best practice and future proofing around known security, threat and regulatory trends.
- Planning service works with specific services
- No
Training
- Training service provided
- Yes
- How the training service works
- We provide training for the security components of cloud software and cloud hosting services (e.g. access control, hardening, etc.)
- Training is tied to specific services
- No
Setup and migration
- Setup or migration service available
- Yes
- How the setup or migration service works
- We help buyers before, during and after their migration to the cloud. We support you in the following four different steps: protect and test your critical systems and detect and respond to a cyber-attack. We orchestrate all dependent parties and workstreams, providing direction and control to ensure risks, issues and dependencies are closely managed thus ensuring migration activities can take place as scheduled and without impact to service.
- Setup or migration service is for specific cloud services
- No
Quality assurance and performance testing
- Quality assurance and performance testing service
- Yes
- How the quality assurance and performance testing works
- We organise penetration testing of critical systems to identify vulnerabilities.
Security testing
- Security services
- Yes
- Security services type
-
- Security strategy
- Security risk management
- Security design
- Cyber security consultancy
- Security testing
- Security incident management
- Security audit services
- Other
- Other security services
-
- Security crisis management simulation
- Security awareness
- Supply chain risk management
- Resilience and recovery strategy
- Platforms security and optimisation review
- Operational Resilience and Recovery
- Identity & Access Management
- Security Assurance
- Security Operations Centre (SOC)
- Certified security testers
- Yes
- Security testing certifications
- Other
- Other security testing certifications
-
- PASSI (as issued by the French national security agency ANSSI)
- OSCP
- GPEN
Ongoing support
- Ongoing support service
- No
Service scope
- Service constraints
- None
User support
- Email or online ticketing support
- No
- Phone support
- No
- Web chat support
- No
- Support levels
- N/A
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- LTSI
- ISO/IEC 27001 accreditation date
- 01/02/21
- What the ISO/IEC 27001 doesn’t cover
- IN OUR ISO/IEC 27001 CERTIFICATION, WE ARE CERTIFIED ONLY FOR THE FOLLOWING: SECURTIY AUDITS INCIDENT RESPONSE SERVICES
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Improved cyber security can help fight climate change through moving to more sustainable facilities. The process of moving to cloud can also identify opportunities to streamline technology needs and reduce the overall hardware requirements, also positively impacting sustainabilityCovid-19 recovery
New ways of working driven by covid-19 recovery often deliver improved ways of working for employees or improved contact points for customers, both of which are in support of different working styles and improved mental and physical health. These require an improved approach to cyber security given the fundamental shift from older approachedTackling economic inequality
Updated cyber security can create new requirements for the organisation based on a shift in the IT operating model, leading to opportunities for skills change and possible new roles. It also supports development of new services and capabilities from cloud providers which can lead to new jobs and skillsEqual opportunity
In support of our equal opportunities policy all of our projects make use of our diverse community of employees. We always look for opportunities to engage with our customers around multiple topics, including where we can share learning and good practice in areas such as equality and equal opportunitiesWellbeing
Improved cyber security supports improved ways of working for employees, supporting different working styles which help with both physical and mental health. In addition, the ability of cloud to enable remote working helps to build more diverse project and organisational communities through equal access to services and communications
Pricing
- Price
- £550 to £1,950 a person a day
- Discount for educational organisations
- No