CyberSecurity

Essential Statistics

% companies that identified breaches immediately
67%
% of companies with contingency plans
52%
% of companies that could not identify source of attack
65%
% with formal cyber security incident management
13%
% of companies that have identified breaches
43%
% of companies experiencing attacks daily
14%
% companies with formal security policies
27%
% of companies hacked in 2018
53%
% of malware by e-mail
92%

Global Attack Map

Global cyber security threats

Deslyon CyberSecurity Services

6 Core Service Provision Elements

Compliance

GDPR, ISO27001, NIS, BS10012

CyberSecurity

Pen-Testing, Monitoring, Response

Risk Management

Cyber Risk Management, Insurance

Resourcing

Short-term staffing and resourcing

Infrastructure

Cloud, AWS, Migrations, Database

Training

Information Security, Governance, Awareness

Tailored Solutions

Solutions Designed To meet Individual Requirements

The Deslyon Service Provision Model closely follows recognised Cyber Security Models.  This is intentional as we believe following a proven model produces increased results and minimum implementation time.

Outcome Focused

The model adheres to a pro-active regime, focused on quality of outcomes for each of our clients.

Communication

Improved communication across organisational functions.

Risk Management

Improved risk management processes.  Supporting effective business decision making.

Security Processes

Enhanced security procedures and processes across the organisation.  Delivering value where required.

Prioritisation

Effective prioritisation of organisational resources, delivering enhanced financial rewards.

Budgeting

Improved visibility of where security issues exist will drive enhanced budgetary control.

Proven Methodologies

Following Industry Best Practice

RESPOND

oThe Respond Phase is where Deslyon can assist with emergency response teams, rapidly gain situational awareness and recommend remedial actions.
These may include amended procedures, staff training or technological solutions.

DETECT

oThis Phase is about monitoring the environment for unauthorised changes or anomalies from the determined baseline as defined during the Plan and Resist Phases.

Deviations will trigger activities in the Respond Phase.

plan resist detect respond cycle

PLAN

oDuring this phase, we work closely with you to determine your current level of compliance and security awareness.  We may conduct audits and assessments of the current state of readiness of your business.

This helps inform what steps need to be taken to implement your specific solution and prepare for the RESIST Phase.

RESIST

oThe RESIST Phase is the implementation or “Do”  Phase.  We act on the recommendations and findings from the Plan Phase and implement the recommended solutions, processes and procedures.