What is Cyber Essentials scheme?

Cyber Essentials is a government-backed and CREST-approved cyber security certification scheme that sets out a good baseline of cyber security suitable for all End-User organisations across all business sectors. The scheme addresses five key controls that, when implemented correctly, can prevent around 80% of cyber attacks. Today, they are readily made available in Asia through us. Click to download CE Flyer
 

ISO27001, a.k.a. ISO/IEC 27001:2013 for Information security management systems

All companies are in pursuit of making bigger profit and avoiding losses and financial mismanagement. Among other benefits that ISO 27001 brings to the company one of the tools that will help companies to enhance their image and expand their market by being qualified to apply for tenders and meet customer and legal requirements. Get your values with a deeper discounts to know your Security Baseline and Criteria, Data Protection readiness & Regulatory Compliance (GDPR) without hurting your budget but giving your business the extra miles

enablor, GDPR (data protection) Compliance process model

enablor, a new paradigmatic platform that intuitively enable your data protection, such as GDPR, regulatory compliance with ease of navigation and constant access to your own data. Brought to you by i-TRUST dk and iTGRC Asia strategic partnership, Now in Asia Pacific.

Corporate Training, E-Learning and Professional Certifications

Benchmark yourself with premium professional recognition. Get recognized with a highly Accredited Online Certificate by (IBITGQ) International Board for IT Governance Qualifications.Accredited to ISO 17024 – the international gold standard for IT qualifications

Penetration Testing

Penetration testing, or ‘pen testing’, is the most effective way of demonstrating that exploitable vulnerabilities within your company’s internet-facing resources have been identified, allowing suitable patches to be applied.

COBIT

COBIT, eSsentials  - Don't leave home without it

The business orientation of COBIT consists of linking business goals to IT goals, providing metrics and maturity models to measure their achievement, and identifying the associated responsibilities of business and IT process owners. Before hitting the 'View more' button,  Click here for an appetizer

CISO-as-a-Service

iTRA Fundamentals is an information & technology Risk-Assurance program. It is designed to test the validity of the past data by adopting an assurance framework which pays attention to three party relationship, an agreed subject matter, criteria of suitability, substantive evidence and a final written conclusion.