Our Services
We provide an impressive breadth and depth of cyber and IT security capabilities. The complimentary skill sets and extensive experience of our security cleared subject matter experts enable us to cover a wide range of security disciplines.
Network and Information Systems Regulations (NIS Regulations)
UK Competent Authorities are taking a proactive approach by implementing an assessment framework including an audit programme to encourage their respective OES to prevent incidents happening.
As an NCSC Certified Cyber Security Consultancy (CCSC) for Risk Assessment and Risk Management, Arcanum are an approved source of help and advice.
For more information check out the NIS Regulations page
The Cyber Assessment Framework
Following the issue of the NIS Regulations, the NCSC have provided the Cyber Assessment Framework (CAF) as a resource for Operators of Essential Services (OES). The CAF Principles define indicators of good practice (IGPs) for each of the 39 Contributing Outcomes that comprise the 4 CAF Objectives.
Arcanum’s NCSC certified consultants have comprehensive knowledge and experience in supporting CNI and other OES with CAF assessments.
For more information check out the CAF page
IEC 62443 Assessments
IEC 62443 framework, formerly known as ISA 99, is the new global standard for the security of Industrial Control System (ICS) networks and helps organizations to reduce both the risk of failure and exposure of ICS networks to cyberthreats.
For more information check out the IEC 62443 Assessments page
360 Degree Security
- Evaluate a single location, a particular part of your business, or the entire organisation
- Analyse potential risks associated with new sites or business expansion
- Identify weaknesses in your current security systems or procedures
- Conduct IT Health Checks
- Carry Out Penetration Testing
- Deliver Business Continuity and Disaster Recovery Planning
- Provide a report listing a detailed set of recommendations
Business Continuity Planning
Cyber Essentials
Cyber Essentials focuses on five essential mitigations within the context of the ‘10 Steps to Cyber Security’. It provides organisations with guidance on implementation as well as offering independent certification for those who need it. The large majority of internet based threats would have been mitigated by full implementation of the controls under the five essential mitigations:
- Access control
- Secure configuration
- Software updates
- Malware protection
- Firewalls and routers
For more information visit the Cyber Essentials page
Cyber Essentials Plus
Cyber Essentials Plus involves a technical audit of your network and computers. It will require a visit to your site and the Assessor will test a random sample of your systems to provide a higher level of assurance that you are complying with the Cyber Essentials Scheme.
For more information visit the Cyber Essentials page
Digital Forensics
Digital Forensics is the process of uncovering and interpreting electronic data for use in a court of law. The goal of the process is to preserve any evidence in its most original form while performing a structured investigation by collecting, identifying and validating the digital information for the purpose of reconstructing past events. It is a branch of forensic science encompassing the recovery and investigation of material found in digital devices.
For more information visit the Digital Forensics page
Forensic Readiness
GDPR Compliance
The GDPR Gap Analysis service provides a step by step assessment of your organisation’s current level of compliance with the Regulations, and helps identify and prioritise the key areas that your organisation must address including:
• GDPR project resourcing
• Data protection governance
• Data protection officer
• Roles and responsibilities
• Personal data processes
• Scope of compliance
• Risk management
• Personal information management system
• Information security management system
For more information check out the GDPR Compliance page
Information Assurance Policies & Procedures
ISO 27001
ISO/IEC 27001 is an internationally recognised best practice framework for an information security management system (ISMS). It can help small, medium and large businesses in any sector keep information assets secure.
Arcanum’s experienced ISO 27001 Lead Auditors are ideally placed to support your business to achieve ISO 27001.
For more information check out the ISO 27001 page
IT Health Checks
IT Security Audits
Penetration Testing
Physical Security Surveys
Secure Architecture Design
Security Accreditation
Security Incident Management
Security Risk Assessments
Security Requirements Capture and Definition
For More Information
Get in touch today and discover how you can ensure the protection of your critical data and infrastructure.
You can contact us directly by calling or sending us an email.
t: 01558 669140