Cyber Risk & Assurance
Cyber Risk & Assurance.
In today's digital landscape, cyber threats are constantly evolving. Our Cyber Risk & Assurance services provide comprehensive protection against these threats, helping you safeguard your sensitive data and maintain business continuity.
Ndlela Kunene provides specialised skills in the disciplines of IT governance, technology risk advisory, information security, data analytics and IT audit - from services and advice in support of external auditors, internal audit, IT risk advisors and as independent consultants to boards, executive management, IT management and business unit managers.
ICT Risk & Assurance.
Our IT audit practice has recognised capabilities and subject matter experience assisting clients in understanding areas of business and industry risk (governance, process, operations, and IT) that translates and aligns IT risk components to the business, with the ability to go beyond an entity’s standard areas of IT controls and to ensure business – IT alignment.
Ndlela Kunene’s IT Audit Practice can assist you with a full spectrum of services, including:
1. IT Risk Assessment
identify and assess risks and potential threats as an important part of risk management.
2. IT General Controls Review
This is an audit designed to address risks which are pervasive across the IT environment and covers a number of generic focus areas such as review of IT security policies and security management procedures, logical access, change and release management, IT physical and environmental security, incident and problem management, and disruptive conditions to disaster recovery and backups.
3. Applications Controls Review
udit intended to address application specific risks during input, processing and output of data on various IT systems.
4. Network Reviews
Review designed to establish the integrity of the IT networks supporting communication both internally and externally.
5. IT Project Assurance/Review
This audit designed to establish whether IT projects have followed a formalized process and aligned to business requirements.
6. ERP Reviews (i.e. – SAP Basis and Authorisations Audits)
This an audit designed to test the adequacy of the configuration in the SAP Basis module and segregation of duties amongst users on the SAP application.
7. Disaster Recovery Review
This is an audit is designed to review and the test the process, policies and procedures related to preparing for recovery of IT infrastructure critical to an organisation in the event of a disaster.
8. IT Due Diligence
This is a review of IT system before / during a major corporate transaction such as a merger or acquisition.
9. IT Audit Training
As part of skills transfer, we assist various organisations with providing training to their internal audit and technology risk departments.
10. IT Audit Dept Evaluation
As part of IIA Quality Assessment Review process, we evaluate the effectiveness IT Audit function.
11. IT Policy / Procedure Review & Development
We assist with evaluating and compiling standard IT policies and procedures.
12. Service Organisations (i.e. ISAE 3402)
We help reinforce confidence through demonstration of effective internal controls as service organisation / third party organisations
13. Maturity Assessment
Audits and pre-certification reviews for a range of standards applicable to today's IT environments (ITIL, COBIT, PCI DSS, ISO/IEC 27001, ISO/IEC 27701, ISO/IEC 27017, ISO/IEC 27018)
Cyber Security & Resilence Services
Our cyber security and data privacy professionals across South Africa exclusively serve your technology security and risk-related needs and hold a variety of industry-recognised professional certifications.
As cyber security continues to affect the bottom line, the need to continually assess cyber risk and improve your security program is paramount. We work with you to identify your organisation's highest strategic risks and, after comprehensive assessments using proven techniques, we help you design or strengthen your system controls, and adapt your policies and procedures surrounding security architecture, access, monitoring procedures and more.
Cyber resilience focuses on the controls to prepare/identify, protect, detect, respond, and recover in an information technology environment, to drive enhancements to the availability, integrity, or confidentiality of IT systems and associated information and services.
Our cyber security and cyber resilience services include:
- Security Transformation
- IT & Cybersecurity Governance, Strategy, Security Planning and Policies & Procedures
- Risk & Vulnerability Assessments
- Attack & Penetration Tests / Ethical Hacking
- Red teaming, Purple - Teaming and Blue-teaming
- Technical Security Assessment
- Security Transformation
- Information and Data Privacy
- Digital Forensice and Incident Report
- Disaster Recovery Planning ("DRP")
- Business Continuity Planning ("BCP") Consulting
- Business Impact Analysis (“BIA”) for DRP/BCP Development
- IT and Cybersecurity Due Diligence
- Managed IT Security Services
- Consumer Data Rights
- Cloud Security
- Security Awareness Training & Program Development
Our Approach.
We employ a proactive and risk-based approach to cybersecurity, conducting thorough assessments, implementing robust security measures, and providing ongoing monitoring and support. Our team of certified experts stays up-to-date on the latest threats and technologies.
Our IT audit practice has recognised capabilities and subject matter experience assisting clients in understanding areas of business and industry risk (governance, process, operations, and IT) that translates and aligns IT risk components to the business, with the ability to go beyond an entity's standard areas of IT controls and to ensure business - IT alignment.
As cyber security continues to affect the bottom line, the need to continually assess cyber risk and improve your security program is paramount. We work with you to identify your organisation's highest strategic risks and, after comprehensive assessments using proven techniques, we help you design or strengthen your system controls, and adapt your policies and procedures surrounding security architecture, access, monitoring procedures and more.
Cyber resilience focuses on the controls to prepare/identify, protect, detect, respond, and recover in an information technology environment, to drive enhancements to the availability, integrity, or confidentiality of IT systems and associated information and services.
Key Benefits.
-
Minimize The Risk Of Costly Data Breaches
-
Enhance Your Organization's Security Posture
-
Ensure Compliance With Industry Regulations
-
Gain Peace Of Mind Knowing Your Data Is Protected
Who We Serve?
Businesses of all sizes across various industries, particularly those handling sensitive data or operating in highly regulated sectors. Secure your digital assets today. Contact us for a cyber risk assessment.