home
Home
Sitemap
 
Consulting Overview

Valiant�s approach to consulting will provide reliable information security consulting and training solutions to enterprises that will help in meeting the chosen security stance by:

� understanding enterprise security requirements,
� navigate the maze of national and global regulations,
� identify vulnerabilities,
� evolve mitigation plans


CONSULTING PRACTICES
 

IS Consulting

  IS Control & Assuarance
  IS Management
  Cyber Crime Investigation
 
 
Professional Services
  Hardening of Servers and Network Components
 

Information Management

  Virus Management
  Network Optimization and Audit Services
 
 
Education and Training
 
CISSP

CISA

CISM

CBCP

BCP-DRP

CompTIA

MASE

Security Awareness

Change
Management


ISO27001

SarbanesOxley

DigitalEvidence
 
     
 
  About Us
  Service Offerings
  Industries
  Alliances
  Careers
  Resource Base
 

Reach us

  Director’s Blog
  Client Testimonials
 
 

 
 

Consulting Practices

 


Information Security Management Practice (ISMP)

The eleven broad requirements of an Information Security Management System (ISMS) as envisaged by ISO 27001 are briefly presented here and would constitute a major part of the presentation, discussion and group work.  Wherever appropriate, the control requirement is briefly reproduced verbatim from the ISO 27001 document though in many cases, edited versions are presented in many of the following sections

 
Information Security Assurance and Control Practice (ISAP)

One of the key elements of good security management is the process of evaluating compliance with the security policies, programs, guidelines and procedures. In addition, there is a clearly felt need to ensure the countermeasures are appropriate (operational assurance) and that they are built on sound security principles and operate as designed (life cycle assurance). Assurance services or audit provides executive management this very critical feedback so that management is either assured that everything is fine or is alerted to the need for revisiting and revitalizing the countermeasures. There are many formats in which IS Auditors provide assurance reports and V-Tech auditors come with a relevant blend of audit process knowledge and information security expertise.

 
 
 
 
            © 2006. All Rights Reserved.             Valiant Technologies Pvt. Ltd.