Consulting Services

We do have a host of consulting services for organisations ranging from manufacturing to IT/ITeS to supply chain to logistics covering different industry segments like healthcare, banking, insurance, services, automotive etc. 

We help organisations to understand where they are, understand their objectives, priorities, weaknesses and strengths through a SWOT Analysis. Then, basis their priority, help them in bridging the gaps by recommending and supporting implementation of a set of appropriate actions. 

We extend consulting on 

  • Information Security Management System based on ISO27001
  • SSAE 16 (SOC1,2,3) Compliance Requirements 
  • Compliance Management System based on SOx, PCI-DSS, HIPAA, FDA QSR
  • Risk Mangement System based on ISO31000 and MoR (Management of Risk)
  • Project Management Framework bases on PMBoK and PRINCE2
  • Service Management System based on ISO20000
  • Quality Management System based on ISO9001, TS16949, TL9000, ISO13485
  • Bridging the gaps in any process management system audit

Write to us with your specific needs. Our consultant will be in touch with you.

Fields marked with * are required.

CIO / CISO Advisory Services

IT Strategy Consulting 

This is our flagship service. 

CIOs need a broader, business based outlook when it comes to IT services delivery and support. We advice CIOs on IT Strategy based on their business strategy. We provide with recommendations on the technologies/tools to be adopted by the organisation to achieve their objectives. It is a blend of service management and security management.

CISO Advisory Services

Today's CISOs need advisory from external bodies in order to focus more on what is happening in the industry and also to keep up to the pace of things. Their focus will more be on the operational elements and we support them with strategic outlooks. This becomes all the more important when it comes to cloud and IoT where cybersecurity becomes the prime concern of every organisation and thus for the CISO.

We primarily support them with:

  • Risk assessment both business and asset based
  • Preparation of SoA
  • Definition of policies and procedures
  • Guidance on management reviews
  • Second party audits on their suppliers/vendors (Vendor Audits)
  • Internal audits
  • Industry updates on latest threats, vulnerabilities
  • Selection of tools/technologies to roll out processes
  • Vulnerability assessments
  • Penetration tests