In line with your strategic needs, OKIOK offers a simplified approach based on its method of key controls which allows to make an assessment of the current situation on the maturity and effectiveness of security controls in order to identify areas for improvement.
In order to fully understand your cyber security status, OKIOK uses its key control method, aligned with the ISO 27002 standard, to analyze the maturity of controls and practices with maximum impact on risk.
Using OKIOK’s unique key control methodology, OKIOK experts proceed to risk identification, analysis and assessment or to a complete review of your overall risk management process according to the needs of your industry.
Based on the three core principles of cyber security (Confidentiality, Integrity, Availability), OKIOK’s unique categorization approach helps determine the criticality of information assets, improves your risk management process, and facilitates your decision making in terms of computer data access.
OKIOK is able to build solutions tailored to your organization’s needs: Developing a complete solution or integrating a component with an existing technology, OKIOK ensures an efficient and adapted intervention, focused on maximizing the capital invested.
The cloud option is inevitable, but how to integrate it into your current framework? OKIOK supports you in all stages of the implementation of the strategy: governance, business impact, evaluation process, service classes and evaluation of solutions.
Whether it is for governance, maturity enhancement or process optimization of your IGA, OKIOK helps you understand the current situation, develops a target and designs and realizes your IGA program in order to ensure its success and the achievement of its objectives.
OKIOK accompanies you when your IT environment is affected by an event attributable to a human or technical cause. OKIOK searches for the cause of the problem and makes the necessary patches. This can be complemented by thorough investigation and forensic expertise.
The purpose of this activity is to determine whether a file requires further analysis and whether the production of an expert report is necessary. It includes preparatory meetings, secured back-up copies, data retrieval and a quick search for traces or evidence.
OKIOK starts the appraisal by seizing the affected equipment to make copies. The information relevant to the analysis is then extracted from the copies and analyzed using specialized tools to identify the cause of the incident or the perpetrator.
This activity consists of reviewing an expertise carried out by an adversary party, in order to identify the questionable elements and to evaluate the quality of the evidence presented. OKIOK experts give their opinion and make recommendations or assumptions about the expertise.
OKIOK provides you with its team of experts in computer forensics. Whether it is advice on investigative strategy or litigation, accompanying the Court during interrogation, drafting of interrogations or pleadings, OKIOK can help you.
OKIOK performs indexing, organizing, reviewing and managing electronic evidence using software specifically designed to assist lawyers and organizations in the management of electronic evidence and other digital aspects of judicial proceedings.
The security program is designed to define, plan and oversee all the activities required to enhance and maintain your security posture according with your current situation, regulatory framework and business priorities.
Workshops with representatives from different business areas are held to understand your priorities and strategic directions. The results are combined with a reading of your security posture and your regulatory requirements to allow OKIOK to produce initiatives aligned with your business priorities.
ELABORATION OF INITIATIVES
Based on the results of the previous steps, OKIOK develops a set of initiatives based on the OKIOK security architecture (ASO). A categorization of initiatives along three axes (governance, structural and tactical) is then carried out in order to optimize the development of the security program.
A prioritization of the initiatives is carried out according to their risk reduction impact in relation to the cost and the complexity of implementation, making possible the determination of an optimal sequence of implementation, developped over the duration of the program.
The result of the previous steps is an effective security program, on a realistic timeline, based on your budget and your ability to achieve it in order to achieve the cyber security target.
655, Promenade du Centropolis
Laval (Québec) H7T 0A3