COVID-19
Our focus is on people, whether in our own business or that of our partners and clients.
Our focus is on people, whether in our own business or that of our partners and clients.
Read about how ICA Consultancy has supported Hampshire Trust Bank in the definition and delivery of an Enterprise Security Strategy
Click on the images below to read our current factsheets for some of the services we deliver.
ICA Consultancy’s focus is on delivering security leadership and advisory services through experienced resources that have previously held leadership position in industry.
However, we are often asked to support those services with technical delivery and/or managed services.
As to not dilute the value of the services we offer we fulfil these requests through a network of trusted partners, whose experience and expertise complements that of our resources.
Security testing is a critical part of any security model. Whether you require software development reviews, penetration testing, or full red team/simulations we can support you through our network of trusted partners. We can complement these services with our advisory services, helping you interpret the results and make risk based decisions on next steps. This ensures your investments directly reduce your risk profile.
Attracting and retaining the capabilities required to effectively manage security operations is difficult, let alone dedicating time to maintain and tune the required tools. Through our network of trusted partners we are able to provide a variety of services, including an identity focused offering providing unparalleled visibility into activity within your estate. Optionally coupled with our CISO-as-a-Service, we can ensure the right management decisions are made.
This form is protected by reCaptcha and the Google Privacy Policy and Terms of Service apply.
As part of our Assess service line, the Third Party Security Assessment (TPSA) methodology ensures organisations can assess the maturity of third parties, identifying key risks and documenting prioritised recommendations to help manage or mitigate information, cyber or privacy risks.
Whether these are potential acquisitions, a new supplier or within an existing supplier landscape, the TPSA methodology provides a framework to give you visibility across your supply chain.
Identify high level risks, “red flags”, business impacts, providing actionable recommendations
Detailed assessment of third party maturity, identify investment impacts, and associated actions
Ongoing assessment of third parties, measuring change in control effectiveness and identifying trends
Identify end-of-contract activities, validate controls are in place and effective, ensuring data is secured
We work with you to understand your business services and assets, and importantly how you interact with your customers and third parties.
Then, utilising an approach similar to our Cyber Security Posture Review, we measure third party maturity against the National Cyber Security Centre’s 10 Steps to Cyber Security, providing an end-to-end view of control maturity. Through a combination of questionnaires, interviews and follow-ups we assess third party maturity, identifying risks and providing contextualised, actionable recommendations.
This approach ensures you understand the maturity of your third parties, having either agreed remediation plans in place with them, or implementing your own compensating controls.
The Third Party Security Assessment methodology provides a framework against which you can continually assure your third parties. We will work with you to embed this into your business.
ICA Consultancy provides advisory and consultancy services, and Capability-as-a-Service (CISO, DPO etc.) engagements, helping organisations identify, manage and mitigate information, cyber and privacy risks.