• No products in the cart.

Services

Professional Services

We provide a range of professional cybersecurity services geared toward keeping your environment and information assets safe. These services are as important as the cybersecurity products you may have deployed to protect your information assets. For example, a cybersecurity policy and strategy for your organisation will ensure that strategies and complementary policies, guidelines, and standards are in place. We will help you define the framework that sets a clear direction for coordinating efforts toward protecting a nation or organisation’s critical assets. Services in these areas include:

  1. Cybersecurity Risk Management We work with Government and private sector to perform a risk-based cybersecurity evaluation using international and industry standards and frameworks. We have conducted this service for a national government, governmental agencies, and several medium-to-large organisations. Our risk management framework addresses core functional components of risk management, including:
    • Risk Identification (Assets, Threats, and Vulnerabilities),
    • Risk Assessment (Risk Calculation and Evaluation),
    • Risk Treatment (Selection and Implementation of Security Controls, and Calculation of Residual Risk),
    • Risk Monitoring (Assess effectiveness of measures and monitor risks).
  2. Cybersecurity Policy & Strategy: We help nations and organisations develop and align their Cybersecurity policy, strategy, and roadmap. Strategic initiatives and activities we undertake in this service area include:
    • Intelligence- and information-led risk management services for governments and private organisations
    • Threat and vulnerability assessments governments and private organisations
    • Sustainable efforts to reduce risks to organisation assets and critical information infrastructure
    • Enhance critical information infrastructure resilience through effective response and rapid recovery (assess- plan-protect-respond-recover-learn cycle).
  3. Alert & Warning: We have worked with government agencies and corporates to perform the following services:
    • Continuous vulnerability research and issue timely alerts as well as recommend courses of action for dealing with the resulting problem
    • Subscribers to our services get informed about newly found vulnerabilities or intruder tools, or known campaigns

Security Augmentation Solution

Through our partner products, we deliver 360-degree capabilities to handle typical day-to-day cybersecurity challenges around phishing, ransomware, and other insider or supply chain cyber-attacks. These solutions work across your entire digital landscape, covering legacy systems, cloud, email, apps, endpoint, and network platforms. These solutions are geared towards:

  1. AI-Powered Threat Prevention: Our Partner solution, Darktrace PREVENT, continuously monitors your attack surface for risks, high-impact vulnerabilities, and external threats. It provides actionable insights into your attack surface and associated risks. Finally, it presents trends on key metrics, such as the type of risks found and their criticality for prioritization. Read More here (https://darktrace.com/products/prevent)
  2. Deep Learning & Automated Threat Detection: Darktrace is a leader in automated threat detection using self-learning AI to understand every user and digital asset within your enterprise. Darktrace DETECT works by analyzing thousands of metrics to reveal subtle deviations that may signal an evolving threat. Read more here (https://darktrace.com/products/detect)
  3. Autonomous Response: Darktrace RESPOND provides autonomous, always-on action to contain and disarm attacks within your enterprise’s digital footprints. It can disarm attacks wherever they occur, be it cloud, email, apps, endpoint, network platforms, etc. Read more here (https://darktrace.com/products/respond)
  4. Privilege Access Management: Our partner product delivers unparalleled Privileged Password Management, Secure Remote Access, Cloud Security Management, and Endpoint Privilege Management. The platform allows your IT and SOC team to have centralized management and reporting; privileged threat intelligence as well as an analytics console that provides unmatched visibility across your privileged access activities
    • AI-Powered Threat Prevention
    • Deep Learning and Automated Threat Detection
    • Autonomous Response
    • Privileged Access Management

Critical Infrastructure Protection

Critical Information Infrastructure (CII) refers to the computer information systems, telecommunication networks, and the underlying flow of data within these systems, which, if destroyed or disrupted, could have a significant effect on the economic and social well-being of a company or country as well as the safety of staff and citizens respectively. More and more attention is shifting from protecting CIIs to making CIIs more resilient. We have worked with government and private organisations to develop a Business Impact Analysis (BIA) and sector-specific CII risk management and resiliency plans. Contact us today to get more insight into how we help organisations to maintain the Confidentiality, Integrity, and Availability (CIA) of their critical information infrastructure.

Cybersecurity Capacity Development

Cybersecurity has not been immune to a global skills shortage and people embracing the new normal with a change of employment. According to the Cybersecurity Workforce Study report, the global cybersecurity workforce currently stands at around 2.8 million, versus the global demand of over 4 million. The numbers are startling and indicate an ongoing staffing crunch, especially in Nigeria and Africa. Our programmes for enhancing capacity development in cybersecurity include:

  1. Cybersecurity Youth League (CYL): We partner with Government and private Primary and Secondary schools nationwide to form Cybersecurity Youth League (CYL) in their school. This Club is a group of interested students under our supervision and guidance to inculcate basic cyber hygiene in these youths. An instructor in the school is identified as a League Leader who is the primary point of contact for all our engagements with the school. To enroll your school in CYL, please email kazeem@ziass.xyz
  2. Cybersecurity Awareness Campaign (CAC): We plan to hold public events, cybersecurity education symposia, Cybersecurity Boot Camps (GenerationCyber Camps), Cybersecurity Awareness week, etc., to educate and engage the public on key cybersecurity practices like online child protection, election interference, pandemic-induced cyberthreats, online gender exploitation, cyber terrorism, etc. Working in partnership with sponsoring private sector organisations, the goal is to raise awareness and consciousness toward a safe and secure cyberspace.
  3. Cybersecurity Education & Training (CET): We are partnering with Universities and Colleges in curriculum development, coaching, and mentoring cybersecurity professionals. The Cybersecurity Education & Training (CET) also offers internships and apprenticeships through a network of partner government and private organisations to provide a platform for young cybersecurity professionals. Interested in partnering with us, click here or contact Dr. Kazeem Durodoye at kazeem@ziass.xyz
top
(C) ZIASS Limited. ALL RIGHTS RESERVED