Want to create interactive content? It’s easy in Genially!
Cybersecurity Circle
Aimee Gray
Created on November 13, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
2. Protect
3. Detect
5. Recover
4. Respond
1. Identify
- Business Continuity Planning
- Table Top Exercises
- Disaster Recovery
- Root Cause Analysis
- Lessons Learned
- Design, Build, Deploy and Manage
- Access Control
- Awareness Training
- Information Protection
- Identity and User Security
Identify
Recover
Customer
- Incident Management
- Incident Response
- Incident Analysis
- Risk Mitigation
- Breach Prevention
Respond
Protect
- Design, Build, Deploy and Manage
- Access Control
- Awareness Training
- Information Protection
- Identity and User Security
Detect
- SOC Service
- Breach Detection
- Anomalies and Events
- Continuous Security Monitoring
- Verification of Protective Measures
2. Protect
3. Detect
5. Recover
4. Respond
1. Identify
Gain visibility into your IT and OT assets with Axians Asset Discovery.
Regular assessments of an organisation’s overall cyber security posture, ensuring existing protections, policies are providing the desired protection.
Security Posture Reviews
Asset Discovery
Identify
Identify differences between existing cyber security controls and the desired security state
Risk Management Strategy
Gap Analysis
Development of a risk mitigation plan, through People, Process, Physical and Technological controls.
Risk Assessment
Identify and analyse the existing cyber security risks against Confidentiality, Integrity and Availability, determining the Likelihood and Impact of a security incident on an organisation.
1. Identify
2. Protect
3. Detect
5. Recover
4. Respond
Ensure the security of identity with Axians suite of Identity and User Security solutions. Ensuring identities for both people and services remain secured and compliant.
Security by design with Axians Design, Build, Deploy and Manage Professional Services.
Identity and User Security
Design, Build, Deploy and Manage
Protect
Safeguard data from unauthorised access, modification, and deletion to maintain Confidentiality, Integrity, and Availability.
Information Protection
Access Control
Protect the confidentiality of systems and data using rigorous access control at all levels, from file-level permissions to Role-Based Access Control on systems.
Awareness Training
Actively gather insights into human risk through behavioural analysis, and implement targeted training and controls to mitigate risk.
1. Identify
2. Protect
3. Detect
5. Recover
4. Respond
Centralise security event monitoring, analysis and detection with Axians 24x7 SOC Services.
Verify protective measures are working correctly using a combination of Penetration testing and security validation
Verification of Protective Measures
SOC Service
Detect
Combining detection tools and techniques to identify unauthorised access of systems and data.
Continuous Security Monitoring
Breach Detection
Continual security monitoring through Axians 24x7x365 Managed Detection and Response (MDR) Services
Anomalies and Events
Proactive monitoring for hidden threats to identify and mitigate malicious activity before it an cause significant damage
1. Identify
2. Protect
3. Detect
5. Recover
4. Respond
End to end incident management, providing co-ordination and communication for security events with stakeholders
Managed Detection and Response services
Incident Management
Breach Prevention
Respond
Proactive mitigation of risks as they arrive, such as managing and remediating vulnerabilities.
Incident Response
Risk Mitigation
Cyber security experts on hand to assist with remediating breaches from Business Email Compromise to malware for containment and eradication.
Incident Analysis
Thorough analysis on incident to determine the appropriate response, including forensic analysis if required.
1. Identify
2. Protect
3. Detect
5. Recover
4. Respond
Continuous improvement through lessons learned ensure security is proactively implemented into business processes
Prepare for the unknown with Axians Business Continuity Planning. Helping to create a comprehensive plan based on recovery scenarios to meeting business recovery objectives
Business Continuity Planning
Lessons Learned
Recover
Trace the root cause of a breach or disaster to ensure it can be effectively mitigated in the future.
Root Cause Analysis
Table Top Exercises
Put your Business Continuity Plans to the test by running Table Top Exercises to prepare all aspects of an organisation in how to react when operations are down
Disaster Recovery
When disaster does strike, Axians are on hand to assist with implementing Business Continuity Plans and recovering services