enterprise security design

Our technical security consultants provide enterprise security architecture design services against defined requirements.

RISK CONTROL AND TREATMENT

We follow a formal process to effectively control and treat identified risks in an appropriate and proportionate manner.

risk management

PRIVACY IMPACT ASSESSMENT

Our consultants conduct privacy impact assessments and data protection act compliance reviews.

THREAT AND risk assessments

We perform detailed threat and risk assessments using the approaches outlined in HMG IS1&2 and ISO 27005.

residual risk register

Our consultants communicate residual risks and any associated gaps and/or mitigations.

rmads AND security case

Our CCP consultants are experienced in the generation of Risk Management and Accreditation Document Sets (RMADS).