Risk Services

Our security experts provide guidance, expertise and recommendations to assist our customers to make fact-based decisions about addressing gaps, managing risk and allocating resources to better protect your organisation.

Icon Risk Management

Risk Assessment

Cybersecurity is an exercise in risk management. The ability to identify, assess, and manage these risks helps remove their uncertainty and transforms technology from a liability into a business enabler.

Read more about the event
Icon Technical Risk Services

Security Assessments

Applications, systems, networks and people form the technological foundation for any business. Expert security testing of this foundation will identify risks, isolate vulnerabilities and prioritize remediation before any exposures are exploited by attackers.

Read more about the event
Icon for Compliance Services

Compliance and regulatory

ISO/IEC 27001? General Data Protection Regulation (GDPR)? CSA Cloud Control Matrix? Our team of compliance specialist will help you achieve your compliance initiatives, meet regulatory requirements and align your security strategy with your mandates.

Read more about the event
Icon for security advisory

Security Advisory

Security is complex. From developing long-term security strategy to implementing the vision, having access to experienced, trusted advisors is essential in safeguarding your assets and protecting against cyberthreats.

Read more about the event

Penetration testing

Applications, systems, networks and people form the technological foundation for any business. By having security experts test this foundation they will identify risks, isolate vulnerabilities and prioritise remediation before exposures can be exploited by attackers.

Read more about the event

Application security assessments

Read more about the event

Security Architecture

Read more about the event

CISO for hire

Read more about the event

Security strategy

Read more about the event

Red teaming

Does your organisation have the capabilities to detect and stop real-life threat actors from compromising your network? Conducting a Red Team assessment from mnemonic will let you find out.

Read more about the event

Threat Intelligence-Based Ethical Red-teaming (TIBER)

Read more about the event

Contact me for more information

Manager Risk Services

Andreas Furuseth