We help and assist our customers in performing a systematic process of Threat Assessment followed by a comprehensive Risk Assessment to assist such
organisations identify, assess and mitigate potential risks that could negatively impact their objectives.
We help our customers align to the robust cybersecurity standards by ensuring they are abiding by the comprehensive legal framework aimed in addressing and
preventing cybercrime in Qatar.
Refer to 2014 Law No 14 Cybercrime Prevention Law unofficial translation EN
for more in depth information.
It is vital that we help our customers protect the personal data they may hold or transmit hence we provide security guidance and assessment for our customers which helps them abide by the rules and regulations for collecting, processing and storing of personal data and ensure that organisation handle personal data
responsibly.
Refer to NCSA-NCGAA-Law No. (13) of 2016 on Protecting Personal Data Privacy – English document for more in depth information.
Framework which helps organisation to implement policies that identifies, Protect, Detect, Recover and Respond to cyberattacks. This is an industry standard widely used across various industries globally for improving an organisation cybersecurity risk management.
Refer to https://www.nist.gov/cyberframework for more in depth information.
We also help our customers implement ISO/IEC 27001 which is an international standard that outlines the requirements for establishing, maintaining and continually
improving our customers information Security Management Systems (ISMS)
Refer to https://www.iso.org/standard/27001 for more in depth information.
We have assisted our customers in implementing CIS controls framework which covers 18 critical security controls that help defend small to mid-size organisation
against common cyber threats.
Refer to https://www.cisecurity.org/controls for more in depth information.
Our COBIT 5 implementation covers the principles, governance and management objectives to ensure comprehensive IT Management for our customers as well as aligning the organisations IT strategy and business goals while managing risks.
Refer to https://www.isaca.org/resources/cobit/cobit-5 for more in depth information.