In an increasingly digital corporate environment, security incidents and cyberattacks are more frequent, and continue to evolve in scale and complexity, as legal and regulatory requirements struggle to follow up the scenario.

How is your company protecting itself from threats?

At Grant Thornton, we help companies of all sizes in its entire cybersecurity life-cycle, avoiding exposure and risk to the businesses of our clients. We count on a team of multidisciplinary experts that use methodologies based on the best practices of cybersecurity (ISO 27001; NIST) and regulatory requirements (LGPD/GDPR and Compliance).

Cybersecurity Cicle

Practices to ensure information security in organizations are wide and cyclic. They require continuity and attention to its variety of phases and processes, being customized to each business, considering their current conditions and activities Such practices include from risk mapping, development of a prevention and monitoring program to a response plan to potential cases of security incidents, followed by the implementation of improvements, so that every aspect that is important to the company is identified, analyzed, monitored, and solved.

The following cycle shows every step of the process. Browse through each one of them to check their respective attributions.

 

 

Our solutions:

Cyber Strategy & Governance
  • Assessment and preparation of cybersecurity structure
  • Management of third-parties and/or suppliers risk
  • ISO 27001
  • Strategic review of cybersecurity
  • Assessment of cyber risks related to the business and associated risks
Management of Cyber Vulnerability
  • Assessment of vulnerabilities and penetration testing
  • Review of infrastructure (firewalls, routers, switches, etc.)
  • Review of network architecture
  • Review of protection technology
Data Privacy and Protection
  • Advising on Data Privacy and Protection
  • Adequacy of processes to regulatory and legal requirements
  • Security of cloud environment
  • Implementation of process of information management
Cyber Resilience and Response
  • Business continuity and Disaster Recovery plans
  • Cyber crisis management - Incident response
  • Forensic computing, investigation, litigation support
  • Recovery and access to critical data and applications
  • Forensic analysis of terminals, servers, and applications
  • Training and awareness-raising in data privacy
Management of Cyber Threats
  • Anti-phishing and anti-malware monitoring
  • Cyber threat intelligence
  • Dark Web analysis
  • Identification of potential cyber threats
  • Preventive drafting of combat and recovery plans
Identity and Security Solutions
  • Review of Security Solution
  • Access governance structure
  • Assessment of protection processes of data environment, access permission and redundancy