BOT / BOE Model



  1. Information Security Governance framework study and setup.
  2. Infrastructure Information Security Architecture review and enhancement. Defense in depth methodology.
  3. DR (Disaster Recovery) and BCP (Business Continuity Plan) study and process implementation.
  4. Information Security Policy and procedures creation and practical implementation.
  5. Data leakage protection strategy implementation.
  6. Change Management process Implementation and management. (weekly review).
  7. Problem Management Process Implementation and monitoring.
  8. Architecture change review board implementation.
  9. Asset and Inventory management implementation.
  10. Information Security and Cyber Security roles and responsibility implementation.
  11. Dedicated Information Security Resources Implementation (onsite resource).
  12. Incident detection and response plan creation and implementation (Incident response runbooks).