Meet the team
Our dedicated team of experts are based throughout South Africa.
Organisations face an increasing risk of cyber attacks, many with limited resources and experience to protect themselves. Our expert team of consultants will assess your unique business needs to help you build a robust security environment. We provide the following services:
Forvis Mazars’ CSMA provides an in-depth review of an organisation’s ability to protect its information and respond to cyber threats. Our assessment takes a balanced view of how prepared the organisation is for cyber threats across people, processes and the technologies deployed to counter vulnerabilities. The CSMA will help your organisation develop a roadmap to enhance your cyber maturity and strengthen your security programme.
Our CSMA incorporates two leading industry frameworks, NIST and ISO 27001, and controls from both frameworks are mapped and consolidated to create our unified approach. Our evaluation covers more than 180 NIST and ISO 27001 control requirements, ensuring that organisations gain a comprehensive understanding of their cyber security posture.
Implementing a Cyber Security Strategy within your organisation is an effective way to manage complexity, provide direction, and gain board-level support. Cyber threats are running ahead of government policy, regulation and business strategy. To counter the evolving cyber threats facing organisations today, business leaders must ensure they have an integrated approach to cyber security. Our consultants help you develop a cyber security strategy that covers governance, processes, people and technologies.
The role of the vCISO provides you with a dedicated cyber security expert to align your cyber security with your business objectives, helping to protect you from the growing threats. Taking on the role of Information Security Officer within your organisation, the vCISO will effectively manage your security strategy, budget, risks and regulatory compliance.
We can provide vCISO services in the short, medium and long term, on a one-off or reoccurring basis and some of the key qualifications of our team members that carry out this service are CISSP, CISM and ISO 27001 Lead Auditor.
IAM is the principle of ensuring that the right people have the right access to the right resources at the right time. Managing application accounts throughout the user lifecycle, for example joining, moving and leaving, can become a daunting task that many businesses struggle with.
Given the current emphasis on global workforce mobility enabled by technology, poor IAM can open your organisation up to further risks internally and externally. We can help by:
Gain a clear picture of the cyber security capabilities of your partner, acquisition target or third-party vendor and the potential risks they may present. Equally, if you are the seller, conducting a self-cyber due diligence before going public will increase the value of your proposition.
Our cyber security & privacy professionals hold qualifications such as ISO/IEC 27001 Lead Auditor, Certified Information Systems Security Professionals (CISSP), Certified Information Security Managers (CISM), CREST registered pen testers, Certified Information Privacy Professional / Europe (CIPP/E) and Certified Information Privacy Technologist (CIPT).
For more information, please contact us using the form below:
This website uses cookies.
Some of these cookies are necessary, while others help us analyse our traffic, serve advertising and deliver customised experiences for you.
For more information on the cookies we use, please refer to our Privacy Policy.
This website cannot function properly without these cookies.
Analytical cookies help us enhance our website by collecting information on its usage.
We use marketing cookies to increase the relevancy of our advertising campaigns.