1. Vulnerability Assessment and Penetration Testing of;
a. Network Infrastructure
b. Systems security
c. Database security assessment
d. Web application security assessment
e. Email security testing such as phishing and malware control.
2. External Threat Landscape Review
3. Review of logical security perimeter
4. GITC Audit
5. Value Additions;
a. Cyber Security Training
i. Board Cyber Security Training
ii. General Awareness Cyber Security Training
iii. Technical Teams Cyber Security Training
b. 40 Day Post Vulnerabilities Analysis