Contact Our Specialist - If you have a specific query about certification or training or would just like to explore how management standards can help your organization. For an immediate response, use the chat options. 

  • Black Facebook Icon
  • Black Twitter Icon

Cyber & Information Security


Personal Data Protection
General Data Protection Regulation (GDPR)
Cyber Security Management

Luther Veritas


About Us
Mission & Vision
Career@Luther

Contact(Email)

Luther Veritas Website

Terms of Use

Cookies Policy

Personal Date Protect Policy
 

All Rights Reserved. Luther Veritas 2019

This website uses cookies as well as similar tools and technologies to identify, understand and improve visitors’ experiences. By continuing without changing your cookie setting, we assume that you agree to this. Otherwise, you may change the cookie setting in your browser. To find out more, please visit our Cookies Policy.

CUSTOMIZED SOLUTIONS TO MEET YOUR BUSINESS REQUIREMENTS

CYBERSECURITY ADVISORY

Information Security Policy and Plan

CYBERSECURITY POLICY AND PLAN DEVELOPMENT

Cyber Security Programs and service is necessary with so many headlines proclaiming security breaches these days, you undoubtedly have a heightened awareness of the need to protect your company by protecting your data. Our information security advisory practice is one of the few that can deliver all the components of a comprehensive information security system.

CYBERSECURITY PROGRAM

Our security program helps organization develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program;

  • Ensure that disaster recovery and business continuity plans are in place and tested;

  • Review and approve security policies, controls, and cyber incident response planning;

  • Identify risks and actionable plans to protect the business;

  • Create, communicate and implement a risk-based process for vendor risk management, including the assessment and treatment of risks that may result from partners, consultants, and other service providers;

CYBERSECURITY RISK MANAGEMENT PROGRAM

Manage information security and risk management awareness training programs for all approved systems users;

  • Provide regular reporting on the current status of the information security program to senior staff and the board of directors;

  • Coordinate information security and risk management projects with resources from the IT organization and business units;

  • Ensure continued compliance of the security programs with all applicable laws and regulations;

  • Oversee identity and access management;

CYBERSECURITY INCIDENT MANAGEMENT PROGRAM

Review investigations after breaches or incidents, including impact analysis and recommendations for avoiding similar vulnerabilities;

  • Manage security incidents and events to protect corporate IT assets, including IP, data and company reputation;

  • Conduct periodic security audits;

  • Responsible for the implementation and maintenance of the most current version of the CIS 20 Critical Controls;

CYBERSECURITY THREAT INTELLIGENT MANAGEMENT

Ensure that all cybersecurity policies and procedures are communicated to all personnel and that compliance is enforced;

  • Coordination of all employees, contractors, and vendors involved in IT security;

  • Provide training and mentoring to security team members;

  • Continuous review of Cybersecurity Program to leverage on any emerging technology and threat information to build a robust Program relevant to the current threat landscape.