What we offer as part of
cyber security

Our accredited cyber experts will provide you with valuable insight into your organisation’s security strengths and weaknesses, enabling you to make informed decisions and take appropriate actions to enhance your cyber security defences. Our process involves key stakeholder interviews, evaluation and reviewing technical, procedural, policy documentation, and all the findings are mapped against NIST cyber security framework standard. 

Together with our public sector experience we will evaluate your organisation’s security in a risk-based approach, and using People, Process and Technology (PPT) to evaluate the maturity of the practice in function areas. 

Icon of a data graph

‘As-is’ assessment

Delivering an accurate view of the current cyber security state within your organisation, including strengths and weaknesses.

Icon of a document with writing on it

Security governance audit

Focuses on assessing the effectiveness of your organisation’s security governance framework and practices.

icon of a lightbulb lit up

Industry aligned

Helping strengthen your organisation’s security posture and mitigate security risk in line with business objectives and industry best-practice.

The Socitm Security Governance Audit

Our experience subject matter experts in security auditing (CISM and Cyber Security qualified), follow our best-practice Security Governance Audit (SSGA) model in the delivery of our cyber security work.

This model is aligned with the open National Institute of Standards and Technology (NIST) standard and incorporates National Cyber Security Centre (NCSS) Cyber Assessment Framework (CAF), COBIT (Control Objectives for Information and Related Technologies), ISO27001, Public Services Network (PSN) Code of Connection (CoCo), and International Society of Automation (ISA).

We focus on assessing the effectiveness of your organisation’s security governance framework and practice, to identify areas for improvement and ensure your security practices are aligned with your business objectives and industry best-practice.

Diagram of the Socitm Security Governance Audit Model (risk-based approach) showing the five key areas in a circle: identify, protect, detect, respond and recover.

How we will benefit you

Our experience subject matter experts in security auditing (CISM and Cyber Security qualified) will support you at whatever stage you are at with your cyber security.

Their security expertise coupled with our extensive public sector experience, means you can be assured you are in safe hands; to identify areas for improvement, protect your environment, and equip you to manage risks effectively going forward.

Image of Will Costello, head of digital, data and technology. There is an image of a shield and a padlock in the right corner.

Want to learn more? Get in touch with our team