The original CESG 10 steps to cyber security in 2012 led to an evolution in security positioning. Cyber Essentials was born on the back of custodians of IT security wanting more guidance and detail than the 10 steps programme. Developed by government and industry the NCSC (was CESG) now has 5 certification bodies and have successfully helped to train many consultants to become accredited Cyber Essentials Practitioners or ACE practitioners.
Being an ACE practitioner is not the end of the story at Audent. Our ACE practitioners, (often experienced in other areas of security governance such as 27001 and PCI) bring real world security experience to the table. Our experiences at the Ministry of Justice, YJB, The Supreme Court, Energy Systems Catapult Warwick Manufacturing Group and Warwick University have been based on practical gap analysis and an eye on ensuring they are as secure as possible, within budget. We are not an organisation that is prescriptive, each customer has their own challenges and particular areas that need more attention. Our Cyber Essentials remediation advice is in plain English and we will debate the best route to get Cyber Essentials without cutting corners.
Cyber Essentials is based heavily on preventing attacks from the internet, yet we have detailed knowledge about all attack vectors assisted with a separate team of advanced penetration testers. Complimented with our consortium of 10 separate, specialist companies. We have in depth knowledge of infrastructure from servers to firewalls and security software enabling us to fully guide each client with a practical remediation. In many cases we are asked to architect a remediated environment for the client and assist with implementation using our pool of 600 experts. Check Point, Palo Alto, Cato, Forcepoint, Cisco, Symantec, Veeam, Fortinet, IBM, Dell and HP are just a few of our vendors where we have accredited consultants.
Don’t hesitate to contact us if you would like to talk real world Cyber Essentials and everything that surrounds successful IT security! Contact us.