Like other important business assets, information is essential to an organization’s business and consequently needs to be suitably protected. Protecting every type of information available within your organization as well as all information systems from unauthorized access, use, disclosure, disruption, modification or destruction, accidental or intentional misuse by persons inside or outside the organization is essential for even the survival of your business in today’s business environment.

Our services in this consulting domain include:

1. ISO 27001 ISMS Assessment and Planning:

Threshold Konsults offers ISMS assessment and planning services structured to benchmark your current information security practices against the practices defined by ISO 27001. We also provide recommendations, and strategic & tactical implementation plans including time frames, milestones, staff education needs, investments and possible returns for ISO 27001.

2. ISO 27001 ISMS Certification Consultancy:
We offer ISO 27001 Certification Consultancy service to ensure a smooth development, implementation, and certification of ISO 27001 in your organization. This service covers all stages of an ISO 27001 project starting from project planning, scoping, training, policies & procedures development, service quality improvements, continuous monitoring, readiness audit, and certification audit support for a successful accreditation.

3. Information Security Assessment and Audits
We offer Information Security Risks identification and Audits. Information security risk assessment is the process used to identify and understand risks to the Confidentiality, Integrity, and Availability (CIA) of information and information systems. We combine industry and institutional knowledge to help our clients identify risks and develop risk remediation planning that is aligned with their business objectives and risk
management framework. We also carry out detailed information systems security and control audits
encompassing information systems security, security controls and control objectives.