Services

IT Governance

We help you align Information Technology to your business objectives.

IT Security

We help you reduce your information security risks to an acceptable level.

STAFF TRAINING

We provide a broad spectrum of development and training options to equip your staff with the tools to succeed.

IT Governance

Strategic IT Planning & Digital Transformation

This service aims to assess the organization’s future IT needs as related to the business goals. It consists in aligning business to IT objectives and creating value from IT investments through the establishment of a well-defined IT strategy.

IT Policies & Procedures

This service aims to develop policies and procedures that fit your organization. It is based on dialogue with business managers to understand your products and services, internal controls and customize policies based on that analysis.

IT Project Management Practices

This service is designed to assist the IT staff handle their projects. Thus, giving them the assurance that IT is taking all the steps needed to ensure that their projects are delivered on time, within budget and as per specs without forgetting the quality dimension.

IT Security

IT security Consulting / Audit Service

This service aims to improve the selection of adequate IT security controls based on risk assessments. The service provides support in the implementation of the ISO 27001 standard or the audit of an implemented information security management system (ISMS).

Business Continuity Planning

This service aims to ensure availability of information systems and data in the event of a disaster. It consists in analyzing the business impact of unplanned events and developing or reviewing the business continuity procedures and the Business Continuity Plan (BCP).

Physical Security Audit

Physical security audit is designed to address the physical security program. This includes the intrusion detection systems, access controls, related processes and procedures. This service is the starting point prior to making security improvements within the organization.

Penetration Testing

This service aims to determine whether your critical data is at risk, identify and mitigate complex security vulnerabilities before an attacker exploits them. Moreover, it aims to identify and mitigate misconfiguration that could lead to systems’ compromise.

Data Privacy - GDPR Implementation

This service involves taking a risk-based approach to data protection, ensuring appropriate policies and procedures are in place to deal with the transparency, accountability and individuals’ rights provisions and building a workplace culture of data privacy and security.

CAPACITY BUILDING

Customized Applied Training Sessions (CATS)

We understand education as well as technology and focus particularly on developing long term partnerships by creating Customized Applied Training Sessions (CATS).

CATS are 5 days in-house training sessions that you can customize by choosing one or more of the below topics :

Project Management
  • Fundamentals of project Management
  • Advanced project management concepts
  • Adapting the Simulation Approach – SimulTrain Training
IT Governance and IT Security Governance
  • Principles and concepts of IT Governance
  • Applying Cobit best practices to establish an IT strategy and an IT security strategy
  • Designing and Implementing Policies and Balanced Scorecard (BSC)
Payment Card Industry Data Security Standard (PCI DSS)
  • Applying PCI DSS 12 requirements to protect credit card data and comply with the PCI DSS
  • PCI DSS Awareness Session
Penetration Testing & Ethical Hacking
  • Fundamentals of Penetration Testing
  • Fundamentals of Ethical Hacking
  • Application and Network Penetration Testing
Information Security Management (ISO 27001)
  • Principles and concepts of an Information Security Management System (ISMS)
  • Assessing the enterprise Context
  • Designing and Implementing an ISMS
Service Management System (ITIL)
  • Organizing for service Management
  • Implementing a Service Management System (SMS)
  • Monitoring and Reviewing the SMS
Business continuity and Disaster Recovery (ISO 22301)
  • Storage Basics (RAID techniques)
  • Storage Architectures and Protocols (DAS, NAS, SAN)
  • Storage Evolution (legacy vs converged, Hyper Converged)
  • Backup and Recovery Strategies
  • Business continuity and Disaster Recovery planning
  • Data Migration
  • Data Centers and Infrastructure Elements
  • Big Data, Could Computing and Security