+233242143106 +233501448518
Have a questions ?
  •  Home
  •     
  • Our Services

Security Consult

We at Brompton Security have a mandate to help businesses and organizations secure IT systems and networks.

Our Security Consultancy Responsibilities include:

  • Testing and analyzing assets for potential security threats.
  • Identifying possible security threats and determining the best security measures.
  • Designing, implementing, and maintaining security protocols, policies, plans, and systems to cover all possible security threats.
  • Coordinating and briefing a team of security specialists and assigning tasks.
  • Meeting with clients to discuss security measures, provide information, and explained the designed system.
  • Running risk assessment and security tests and designing countermeasures to eliminate as many potential risks as possible with reports.
  • Suggesting improvements to existing security systems.
  • Remaining up to date with the latest security systems, tools, trends, and technology.
  • Training staff to recognize and defend against security breaches and risks.

Our Category of Security Consultancy are:

IT Security Consulting and Architecting:

Brompton Security works with IT personnel, audit executives, management and audit committees at companies of virtually any size, public or private to assist with internal security activities at all levels. These include assisting with the development of security architecture, implementing a specific security solution, architecting an end-to-end solution and helping to assess a security posture.

Business Security Workshop:

​Our Business Security Workshop is a facilitated session led by a Senior Security Consultant to provide a systematic approach to develop an IT security strategy for either a specific business need or to develop an overall strategy.

​Business Security Health Check:

Our Business Security Health Check assesses the current state of security and provides a snapshot of implemented controls as compared to industry standards. Ten key security management areas are examined, which includes Security Policy, Security Organisation, Asset Classification, and Control, Personnel Security, and Physical and Environmental Security.

Corporate Security Training:

Our Corporate Security Training offering is customised for the specific client needs and audience. This multi-faceted custom offering provides security training on many different facets, including modules on Security Policy, PCI, Regulatory Compliance and others. The training sessions are normally two, four- or eight-hour sessions per day, and include topics such as Corporate Security Policy, Payment Card Industry (PCI), Security Standards, Application Development Security and Vendor/Partner Security.

Client Customer Security Training:

We design, train and manage security training on a fully outsourced basis or by working with an existing internal security team to supplement when or where there is a lack of adequate staff or skills. Topics in the training sessions include Phishing Awareness, Email Response Awareness, Online Banking Best Practices, and Identity Theft Prevention.

​Security Forensics:

At Brompton Security, our Forensics Team work with IT personnel, audit executives, management and audit committees at companies of virtually any size, public or private to assist them with their internal audit activities once a security breach or fraud is suspected or has been uncovered. This include starting and running the activity on a fully outsourced basis or working with an existing internal audit function when there is a lack of adequate staff or skills. In addition, we help assess fraud risks and implement solutions to better manage these risks and lead investigations into IT irregularities and provide court ready proof and briefs of these irregularities.

Business Partner Management Strategy:

The Business Partner Management Strategy Offering includes a detailed examination of all the company’s business processes. After mapping the business processes, the security team overlay its knowledge of key security vulnerabilities, review all the external access points and interview a sample of the business partners.

​Vendor/Supplier Management Strategy:

The Vendor/Supplier Management Strategy Offering includes a detailed examination of all the company’s business processes that involve 3rd party vendors or suppliers. We then prepare a recommended strategy and implementation plan to maintain a minimum level of security based on the business needs and level of access needed by the vendors and suppliers.