IIZZON.png
 

Collaborative Cyber Security

Operational Technology Specialists

dylan-gillis-KdeqA3aTnBY-unsplash.jpg

Collaborative Cyber Security

Operational Technology Specialists

 

IISZON has been incorporate to provide specialised security services for operators of essential services, our experiences of providing governance, risk, compliance and investments advice over the last eight years has driven a strategic shift to enable delivery of measurable risk reduction benefits within a shorter timeframe. 

IISZON has been incorporate to provide specialised security services for operators of essential services, our experiences of providing governance, risk, compliance and investments advice over the last eight years has driven a strategic shift to enable delivery of measurable risk reduction benefits within a shorter timeframe. 

 
 

Our Approach

IISZON operating model is aligned and anchored to NIST framework principles as defined within the GOVERN function.

Learn More

ORGANISATIONAL CONTEXT

Circumstances, mission, stakeholder expectations, legal, regulatory, and contractual requirements surrounding an organisation’s cybersecurity risk decisions are understood

RISK MANAGEMENT STRATEGY

Priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions

SUPPLYCHAIN RISK

Processes are identified, established, managed, monitored, and improved by organisational stakeholders

ROLES, RESPONSIBILITIES & AUTHORITIES

Security roles, responsibilities, and authorities to foster accountability, performance assessment, and continuous improvement are established and communicated

POLICY, PROCESSES & PROCEDURES

Security policies, processes, and procedures are established, communicated, and enforced

OVERSIGHT

Results of organisation-wide security risk management activities and performance are used to inform, improve, and adjust the risk management strategy

Circumstances, mission, stakeholder expectations, legal, regulatory, and contractual requirements surrounding an organisation’s cybersecurity risk decisions are understood.

Priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions.

Processes are identified, established, managed, monitored, and improved by organisational stakeholders.

Security roles, responsibilities, and authorities to foster accountability, performance assessment, and continuous improvement are established and communicated.

Security policies, processes, and procedures are established, communicated, and enforced.

Results of organisation-wide security risk management activities and performance are used to inform, improve, and adjust the risk management strategy.

 
 

Our Services

INNOVATION

Augment engagements with technology and security innovators seeking to reduce security risks

INFORMATION ASSURANCE

Operational technology services focused on assuring NIS systems, data and site based security controls

V-CISO CONSULTANCY

Fractional C-Suite consultancy centred on driving appropriate and proportionate security strategies aligned to risk appetite