Cyber Security Services

Information & Cyber Security Services

icon-governance@2x.png

GOVERNANCE

Program Management and Policy

icon-testing@2x.png

PENETRATION TESTING

Penetration Testing services

icon-iso-cert@2x.png

ISO27000 CERTIFICATIONS

ISO27001, ISO27017

ISO27701

icon-bcp@2x.png

BCP / DR

Business Continuity and Disaster Recovery programs

icon-assessment@2x.png

ASSESSMENT & STRATEGY

Security Assessments & Strategy Advisory services

icon-cloud-security@2x.png

CLOUD SECURITY

AWS, Azure and Google Security Architecture and Assessment

icon-incidents@2x.png

INCIDENT RESPONSE

Incident Response Planning, Support and Testing

icon-risk@2x.png

RISK MANAGEMENT

Risk Assessment &  Management ISO27005

icon-id-access@2x.png

IDENTITY & ACCESS

Identity & Access Management & Privileged Access

icon-vuln@2x.png

VULNERABILITY MANAGEMENT

Vulnerability Management programs

icon-ciso@2x.png

vCISO

Virtual CISO / Information Security Management services

ekko Agility

Confluence and Jira templates, workflows to support information security programs, ISO27001, ISO27701, NIST CSF, Cyber Essentials and more...
 

Governance

Information Security policy documentation, management and governance processes

Program management, governance board facilitation 

Metrics development and reporting

 

ISO27000 Standards Certification

Implementation and maintenance services:

ISO27001 Information Security Management Systems

ISO27017 Cloud Service Provider Certifications

ISO27701 Privacy and Personally Identifiable Information Protection

 

Cloud Security

Security architecture, assessments, identity and access management, configuration management, monitoring, logging, and other security advisory services for:

Amazon Web Services (AWS)

Google Cloud

Microsoft Azure

Identity and Access Management

Identity and Access Management program implementation

Identity and Access Management architecture services

Privileged Access Management (PAM) advisory services

 
ISO27001 Certification
ISO27001 certification templates , policies, and procedures. Pre-defined project plan and program steps 

Security Awareness

Security Awareness program design and implementation

Phishing campaign management

Communications management

 
 

Business Continuity Planning / Disaster Recorvery

Business Impact Analysis (BIA) facilitation

Enterprise Business Continuity planning, documentation, training and testing

Disaster Recovery planning, documentation and testing

Incident Response and Management

Incident Response planning and documentation

Incident Response plan testing and training

Response assistance and forensics advisory services

 

Vulnerability Management

Vulnerability Management program implementation services

High-value asset inventory management and assessment

 
SSAE18 SOC 2
ekko Agility helps organizations quickly obtain their SOC 2 report using standard templates and control processes to facilitate customer security and procurement processes

Penetration Testing

Black box and white box penetration testing

Web and mobile app assessments

SDLC secure process assessments and advisory services

 

Assessment and Strategy

Information Security program assessments, executive reporting, and baselining services

Short and long term strategy advisory services

Information Security program business alignment and resourcing

 

Risk Management

Risk Management program implementation

ISO27005 consulting

Risk assessment facilitation

v CISO

Start-up vCISO services

Information Security program management

C-Level / Board advisory and support services

 
 

Palo Alto, CA

 

ekko-info@ekkoconsulting.com

(650) 353-7920

Links

© 2020 by EKKO Consulting, Inc. 

Privacy Policy