admin/ April 30, 2017/ CyberSecurity, Practices/ 0 comments

Hello all,

Welcome to our website blog.

In this blog, we care to share our thoughts and insights on Cyber Security processes and business outputs, as we believe that governing your cyber defense operations will give your organization the highest value regardless of your tools and solutions. Our moto “protecting what matters“, reflects the need for business management to govern security just like any other process.

We base our consultancy on vast experience in implementing various IT and Security practices, standards and frameworks. Mainly (but not subject to), the NIST (National Institute of Standards and Technology)  Cyber Security Framework and ISACA‘s COBIT 5 family of products. Through our work, we faced the challenges of Nation level organizations, Government, Military, Fortune 500 enterprises, Banks and other financial institutes, regulated traded companies and up to small entities with pin point needs.

We welcome your comments, remarks and mostly, your questions, as we will love to publish post on areas you care to deeper understand and get our advice on.

Feel free to connect with our leading consultant at

Share this Post

Leave a Comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>