SECURITY

Helping Businesses Blossom

Since Sam advisorys began, we’ve provided our services to a variety of businesses. On every project we undertake, our most important objective is to relate with clients and understand their core necessities and goals. Below are some examples of the work we’ve done - take a look, and get in touch to learn more.

adaptation.png

GOVERNANCE & ARCHITECTURE

COBIT
ISO 38500/ ISO DIS 27014
ISACA CGEIT Framework
TOGAF EITA
SABSA ESA

iteratively.png

RISK MANAGEMENT

Technology Function RiskInformation Security RiskData Privacy RiskIT Service Mgmt. RiskApplication Risk ModellingISO 31000: 2018

transparency.png

DATA SECURITY & PRIVACY COMPLIANCE

KSA SAMA; BCM CSFUAE – NESA CSFIndia- RBI; SEBI; IRDA CSFHIPAA; SOX Type IISWIFT; CPMI

iteratively (1).png

IT SERVICE MANAGEMENT

ITSM Governance Framework & Strategy DevelopmentITSM Process Design & EngineeringITSM Operation ReviewITSM Tool Configuration

algorithm (1).png

COMPUTING & NETWORK SECURITY

Network Security Review
Data Center Security Audit
End Point Security Review
Cloud Security Review

improve.png

IT BUSINESS CONTINUITY

IT BCM FrameworkIT Contingency PlanIT DR StrategyISO 22301 BCM standard

target (1).png

CYBER SECURITY

NIST CSF
Vulnerability Mgmt. Strategy
Defense in Depth Strategy
ISO 27032:2012
System Security Testing

validating (1).png

INFORMATION SECURITY MANAGEMENT SYSTEM

ISMS Framework
ISO 27001:2013 ISMS
Executive Awareness Program
ISMS Certification & Audit

Want to join our growing list of successful projects and satisfied clients?

79dc31280371b8ffbe56ec656418e122.png