Advisory
A one off engagement with a concrete end product: a personalised report with findings, priorities and an actionable plan.
- Analysis, evaluation and recommendations
- Fixed start and finish, clear scope
- Outcome: strategic report and action plan
Our advisory services are one off, independent analyses delivered as a concrete report with an action plan. No implementation, no ongoing operations. Those are offered through our partnerships.
Advisory is a snapshot: we analyse, advise and deliver a report. A partnership is the ongoing delivery: we implement, manage and monitor. The two naturally follow each other.
A one off engagement with a concrete end product: a personalised report with findings, priorities and an actionable plan.
Ongoing delivery: implementation of measures, day to day management, monitoring and incident response. Through our IT, Security or Combined Partner models.
Every advisory engagement is tailored during an intake call to your situation, sector and priorities. The scope and method below is the standard starting point.
“How secure is my organisation?”
An independent, organisation wide evaluation of your cybersecurity maturity. We look from the helicopter: which business processes run, which assets are critical, which threats are realistic, and how mature is your organisation in policy, awareness and organisational measures. We touch no systems, we run no scans. The goal is a strategic overview of risks and maturity.
Scope
The Assessment is a one off analysis. Implementation of recommendations (SIEM rollout, XDR deployment, writing policies) is covered by an IT, Security or Combined Partnership.
Method
Deliverable
“Do I meet regulation X?”
We test your organisation against the relevant cybersecurity regulation and frameworks. Based on sector, size and activities we determine together which framework applies. You receive a clear gap analysis and an advisory report with concrete steps to become compliant.
Scope
This report advises. The actual implementation of compliance measures is a separate engagement.
Method
Deliverable
“Are my systems technically secure?”
We go hands on the systems and perform technical security tests. Where the Cybersecurity Assessment gives the strategic overview, the Technical Audit dives deep into the systems themselves: how is the network built, which ports are open, are firewalls correctly configured, are systems patched, are web applications vulnerable to known attacks.
Scope
A snapshot at a given moment, not a guarantee of complete security. Implementation of remediations (patching, firewall reconfiguration, system hardening) is covered by a partnership. Continuous vulnerability management (monthly scans, continuous monitoring) is covered by Security Partnership.
Method
Deliverable
“Am I prepared for a cyber incident?”
We evaluate your current readiness for cyber incidents and develop a tailored incident response plan and crisis communication plan. The result is a complete, actionable document: your playbook for the day something happens.
Scope
We deliver the plan on paper. Running exercises, training staff, setting up SIEM or monitoring and incident response retainer (stand by) are separate engagements or covered by Security Partnership.
Method
Deliverable
Both services complement each other. The Assessment delivers the strategic overview and priorities, the Technical Audit digs deep into the systems. You can take them separately or combined.
| Cybersecurity Assessment | Technical Security Audit | |
|---|---|---|
| Level | Organisation wide, strategic | System specific, technical |
| Method | Interviews, documentation review, frameworks | Vulnerability scans, penetration tests, configuration reviews |
| What we examine | Policy, processes, risks, maturity | Firewalls, servers, network configuration, web applications |
| Example finding | Patch management scores 2/5, no policy exists | Server X is missing patch CVE-2024-XXXX (Critical) |
| Audience | Management | IT lead, system administrator |
| Do we touch systems? | No | Yes, scans, tests, configuration review |
In a short, no obligation call we determine together which advisory type fits your situation, which scope makes sense and how long the engagement is expected to take.
Schedule an intakeWho it is for
SMEs, non profits and organisations in the insurance sector looking for an objective view of their cybersecurity posture, a foundation for compliance or preparation for an incident. Independent advice, we do not sell our own products.