top of page

Cybersecurity and IT management consulting

Cyber security services

We provide cyber security consulting services, starting with cyber security inspections, ending with implementation and taking over some or all of the cyber security functions from the company.

Cyber security checks

We perform cyber security or intrusion testing in accordance with industry best practices, such as OWASP WSTG 4.2, ASVS 4.0, MSTG, OSSTMM 3, NIST, etc., providing a detailed report and plan to address the identified vulnerabilities - for both web and mobile applications, API and desktop applications.

Social engineering, phishing services, training

We offer social engineering inspections of companies, phishing inspections, training of employees in these issues, taking into account the specifics of each company's industry. 

Continuous risk-based cybersecurity maintenance (CISO as a service)

We offer to take over some or all of the cyber security functions of the client's company, focusing on the biggest threats, performing periodic inspections, collecting cyber threat information, analyzing cyber incidents and training employees.

IT audits and consulting

We perform compliance audits in accordance with ISO / IEC 27001 and other standards and guidelines of good practice. We perform compliance audits in accordance with Cabinet of Ministers 442, FCMC No. 150, NIS2 directive, DORA (Digital Operational Resilience Act), SOC 2, PCI DSS and other regulatory enactments. We also provide other cyber security consulting as needed, such as policy and procedure development, risk assessment, business continuity modeling and development, and other services.

IT management consulting

CITM Advisory provides various types of IT management (CIO Advisory) consulting, such as IT strategy development, research, system comparisons, etc. 

IT management audits

We help the client to assess the current state of IT management, taking into account industry best practices and guidelines, such as COBIT 5, ITIL 4, ISO / IEC 20000, etc. If necessary, we assess the current situation and provide a detailed plan to improve it.

Mergers and aquisitions IT consulting 

During the process of buying and selling companies, we offer to evaluate the existing IT infrastructure, processes, existing and planned projects, contract analysis, as well as cyber security assessment to provide full information about the current situation and required future investments, and potential cyber security threats that may be useful in the negotiation process. , determining the value of the company.

IT strategy, research

We are developing a company  IT strategy, taking into account the goals and needs set by the business, as well as current events in the industry. As part of the development of an IT strategy or separately, we can perform comparisons and research of IT systems, understanding the best solution for the company's needs (summarizing both functional and non-functional requirements). 

Other IT and IT management consulting

We develop functional and non-functional system requirements, system performance evaluations, support in project management and quality monitoring, etc. consultations according to the client's needs. 

Tailored solution for customers in cyber security and IT management consulting 

CITM Advisory is based on the principle of the alliance, where, in cooperation with high-level specialists in the industry, we can provide the most appropriate specialists in a particular matter. CITM Advisory specialists are highly qualified with various industry certificates, for example in the field of cyber security - ISO / IEC 27001 lead auditor, OSCP, CPTE, CEH, CISA, , CISSP, CISM, Cisco security;  IT management or project management certificates - Prince2 and ITIL. The main emphasis is on many years of experience in consulting, helping clients in various industries, hedge against cyber security risks and successfully implementing new IT initiatives.

 

Contact us with any related questions - we will offer customized solutions. 

bottom of page