Skip to content

SERVICES

ADVISORY

  • INFORMATION RISK ASSESSMENT
    Our world-class information risk assessment ensures over 450 vulnerabilities are reviewed in interviews with strategic and tactical teams. The assessment factors in concerns raised by stakeholders, audit findings and past incidents ensuring that all security requirements are identified and prioritised according to business impact.
     
  • INFORMATION SECURITY MANAGEMENT SYSTEM (ISMS) AND ISO 27001 CERTIFICATION
    We have the necessary skills and experience to partner with you to scope, establish an ISMS, and take it through to a successful ISO 27001 certification. We can furthermore assist with certified lead auditor and lead implementer training for all teams.
  • IT GOVERNANCE AND IT RISK REVIEW
    IT governance is a framework that ensures your IT infrastructure supports and enables an organisation to achieve its goals. We will perform an IT process maturity review, IT risk assessment and can assist with remediation of your IT environment.
  • DATA GOVERNANCE FRAMEWORK – CLASSIFICATION AND HANDLING
    We provide an approach to proactively minimise the likelihood and impact of a data leak. We help both business and IT to understand the value of their data, establish classification rules and then provide guidelines and training.
  • DISASTER RECOVERY
    Following an alignment process to the Business Continuity Management (BCM) strategy, we establish detailed disaster recovery plans for all key areas of the organisation. We then run simulated disaster scenario tests and help to mentor and upskill the DR Operations Team.
  • IT AND NETWORK SECURITY REVIEWS
    IT and network devices are crucial for the operation of any organisation. An IT and network review will ensure that weaknesses in configuration are identified and remediated, reducing the risk of a security incident.
  • HUMAN RESOURCES GOVERNANCE
    We have the necessary skills and experience to partner with you to scope, establish an ISMS, and take it through to a successful ISO 27001 certification. We can furthermore assist with certified lead auditor and lead implementer training for all teams.
  • OPEN SOURCE INTELLIGENCE GATHERING
    The Wolfpack OSINT investigation involves collecting several different types of information: organisation, infrastructure, employee, and document.

     

  • INFORMATION RISK STRATEGY AND ROADMAP
    Our information risk framework provides the foundation upon which we architect the strategy to support business objectives and the subsequent information risk programme. The modular nature of the framework furthermore provides an agile environment to allow the organisation to continuously re-evaluate their priorities.
  • PRIVACY AND PROTECTION OF PERSONAL INFORMATION ACT (POPIA) REVIEWS
    We conduct a privacy impact assessment and provide the necessary consulting services to ensure your organisation is compliant with relevant privacy and data protection requirements.
     
     
  • CYBERSECURITY AND PRIVACY RESOURCES  

    A DPO resource will enable your organisation to adopt a proactive approach to managing personal information. Our top-tier security experts are available to organisations who need security expertise and guidance.

  • SUPPLIER AND THIRD-PARTY RISK
    We will review your current supplier management lifecycle to ensure that the applicable governance components such as NDAs, SLAs and other contracts are in line with information risk management requirements. We also perform independent third-party risk assessments.
  • BUSINESS CONTINUITY AND CRISIS MANAGEMENT
    We establish BCM governance components in accordance with ISO 22301, then conduct a Business Impact Analysis (BIA) with senior management to determine and evaluate the potential effects of an interruption to critical business operations.
  • SECURITY ARCHITECTURE AND DESIGN
    A well-designed security architecture programme will ensure that all security is business-driven, risk-focused, comprehensive, modular, auditable and transparent, demonstrates compliance and provides two-way traceability of business requirements.
  • CHANGE AND RELEASE MANAGEMENT
    IT change and release management is primarily concerned with the governance of transitioning new technology and procedural adjustments into a live operational environment, with as little risk as possible.

WOLFPACK ADVISORY

TRY OUR PROACTIVE APPROACH

The implementation of a proactive approach to information risk management will ensure that your business is better prepared for any internal or external attacks, leaving your company more secure and ensuring better governance. However, businesses without such an approach in place are left vulnerable, with potentially disastrous consequences.

AWARENESS

  •  
    AWARENESS CONTENT
     
     
    Wolfpack maintains a range of professional content that is engaging and realistic - based on actual incidents taking place each year. Each topic comes with supporting materials such as videos, posters, screensavers and cartoons that are branded according to your corporate identity guidelines to further drive the message home. 
     
  • AWARENESS MANAGEMENT PLATFORM
    The platform is a cost effective and multifunctional tool as it not limited for the use of cybersecurity awareness but could also be used for other departments as well as other client training programmes.
     
  • HUMAN VULNERABILITY ASSESSMENTS
    Wolfpack has a comprehensive portfolio of Human Vulnerability Assessments which simulate the possibility of realistic attacks which threaten most organisations. The aim of these assessments is to determine the level of awareness held by employees as well as determine which areas need greater focus.
  • CYBER WELLNESS WORKSHOPS
    These sessions are targeted at all employees in an organisation. The interactive and demonstrational sessions educate employees of various risks, threats and trends. The session further includes how to better protect themselves and their families, with a portion of the session focused on how to protect the company.
     
  • AWARENESS PROGRAMME MANAGEMENT
    Awareness programmes provide an excellent way to educate your staff and keep organisational Information security requirements fresh in their minds. The idea behind the campaign is to and to understand how to report a weakness or actual incident. Monthly management and support ensures the awareness programme is successful and runs effectively.
     
  • EASY POLICY COMMUNICATOR
    We have summarised key requirements from a typical information security policy into an easy to read booklet available in digital format that can be shared electronically or printed, which outlines expected behaviours. 
     
  • EXECUTIVE WORKSHOPS
    These sessions are titled “From the Boardroom to the War Room”, focusing on the risks executives may pose to an organisation due to the large amounts of information at hand. The workshop session encompasses governance and risk compliance aspects, including the importance thereof.
     

TRAINING

  • CYBER RANGES
    Much like the diversity of cyber vulnerabilities, breaches and threats, your cyber security should be both versatile and agile. From staff training, ongoing skills development and recruitment assessment to performance review, our CYBER RANGES solution has a lot to offer. Learn more...
     
     

ONLINE SOLUTIONS

  • CYBERSECURITY AWARENESS PLATFORM
    Hackers have changed their approach, increasingly targeting staff & exploiting human error. The Cybersecurity Awareness platform offers a complete solution to test, train, measure and reduce human risk. Learn more...
     
     
  • OBASHI
    OBASHI documents, maps and models how people, process and technology interact to make a business work and displays the results in a way which both technical and non-technical people can easily understand. Learn more...
     
     
  • ZEROFOX
    ZeroFOX combines advanced AI-driven analysis to detect complex threats on the surface, deep and dark web, fully managed services with threat analysts that become an extension of your team, and automated remediation to effectively disrupt threats. Learn more...
     
     
  • DESKALERTS
    DeskAlerts allows for the transmission of information to a large number of people effectively and guarantees to catch attention of receivers without causing any disturbances. Communicate with all stafff about current or planned tasks, taking pressure off your IT department or help desk without relying on email. Learn more...