Advisory and Oversight

– Standards based (ISO27001) assessment process,

Phase 1: review of the business readiness by reviewing the procedures and controls in place. A full gap analysis is performed and a remediation plan is created .

Phase 2: review of the procedures and controls operating within the organisation to assess they are working effectively and efficiently

Phase 3: Is the ongoing review for continuous assurance of meeting a level of compliance but also ensures the organisation and its controls are addressing new threats and are continually improving their protective measures.

ISMS Framework

Develop or improve information security controls implementation of the client’s Information Security Management System (ISMS) from the initial stages to a robust and mature framework. This follows the

  • ‘plan-do, check-act” (PDCA) method
  • continuous improvement method

Cyber Security Audit

C-Clarity follow the NIST Cybersecurity Framework using the Advisory and Oversight outputs to understand the context through:

  • engagement with senior management and their concerns
  • audit scoping and planning (i.e. conduct planning meetings and initial requests)
  • field work – controls design (i.e. conducting process walkthroughs)
  • fieldwork testing (i.e. sample based testing and preliminary findings)
  • Audit report containing a full assessment and remediation/strategy roadmap

Information Security Policies and Procedures

Review and update of the information security policies and / or procedures that adhere to the nature of the business and measures required to be compliant.

  • reviewing mandatory documentation and records, including authorisation levels and ownership
  • reviewing how the ISMS is maintained and controlled (monitoring and measurement, security audits and training)
  • reviewing any existing risk management framework to ensure information security risk are identified and addressed a
  • A full report containing findings and recommendations.
  • A remediation roadmap

Security Testing - Penetration Testing

  • Development and Application Security Assessment Services,
  • bespoke testing is provided to suit the customer and the client receives a report detailing the attack methods utilised and an analysis of the findings along with an assessment of the risk levels presented by any vulnerabilities.
  • A final summary of findings is provided to management and appropriate technical groups highlighting relevant issues.

Training and Awareness:

Leveraging our preferred platform to provide information security and cyber security based training to our customers.

Security Operations

  • C-Clarity team assists to define your Security Operations & Incident Management requirements and strategy particular to your business’s needs and threats
  • C-Clarity assists wit the definition  and integration of your strategy with your existing security operations and  monitoring teams to ensure effective monitoring and Incident Response procedures are in place.
  • Throughout the process we provide process, procedure and technical  Security Testing and reporting to ensure a fit for purpose and quality assured process is in place.

Breach response and monitoring

Following the NIST approach to Breach and incident management C-Clarityassists its customers in developing and implementing a process, tools,procedures and staff training to be able to securely, efficiently and effectively manage major data incidents and breaches.

  • Procedures in place to ensure detection, manage and appropriately record personal data incidents and breaches.
  • Assess all security incidents and report relevant breaches to the ICO within the statutory time frame.
  • Procedures to inform individuals where a breach may result in a high risk to their rights and freedoms.
  • Review and monitor personal data breaches.
  • C-Clarity will have performed and fulfilled an independent data protection and information governance audit and had the compliance checking procedure assessed.
  • A process and procedure to manage information and outcomes of monitoring/review activity are communicated to relevant internal stakeholders, including senior management as appropriate
  • You will be empowered to make the right decisions at the right time to ensure compliance, privacy and safety of data assets at all times.

The most common questions

What services do you offer?

Can you assist with regulatory compliance in cybersecurity?

Are your services customizable to fit my specific needs?

How can C-Clarity help secure my cloud environment?

How does C-Clarity handle data breaches?

Does C-Clarity offer cloud migration support?