Nangia Nxt

Cyber Security

Cyber Security

Cyber threats don't always come from anonymous hackers or online criminal groups. Vulnerabilities can arise within your own business too.​

Every business, regardless of its size, faces the potential threat of a cyber attack. This is because every business, along with its vendors, partners, customers, and other stakeholders, possesses key assets that criminals may seek to exploit. These assets could be monetary funds, financial data, personal information of employees and customers, or even the infrastructure that supports the business.

The approach and commitment of organizations to implementing cyber and information security are pivotal in minimizing risks and aligning with their business objectives. Our unique business model, values, and approach, coupled with our well-trained and highly skilled workforce, provide deep insight and trustworthy consultation to clients seeking a reliable partner. Our Cyber Security team comprises professionals with a unique blend of technological expertise and business acumen derived from diverse backgrounds and extensive experience in various industries and sectors.

image

Services Offered

  • Unified Policy Framework creation
  • Policy, Procedure and SOP review, update
  • ISO 27001, 22301 Certification Support
  • Cyber Maturity Assessment
  • IT Risk & Strategy Roadmap
  • Security Training and Awareness Programs
  • PCI-DSS GAP Assessment
  • Regulatory Compliance Assessment and Management (RBI, SEBI, IRDAI etc.)
  • ISAE and SSAE Assessments
  • Governance, Risk, and Compliance (GRC) Reviews and support
  • Third-Party Risk Management
  • Business Continuity Management
  • Data Center and Disaster Recovery Reviews
  • WebTrust, PKI, and Certificate Authority Assessments
  • AADHAAR Based Assessments
  • AUA/KUA Assessment
  • ITGC Audit
  • SOX compliance
  • Vulnerability Assessment and Penetration Testing (VAPT)
  • Secure configuration review
  • Application security testing
  • Security architecture review
  • Secure source code review
  • Red Team Assessment
  • Cyber threat intelligence
  • Cyber incident response
  • Social engineering attack simulation
  • Breach Attack Simulation
  • On demand penetration testing
  • Cloud Security Assessment
  • IoT Security Assessment
  • DevSecOps
  • Operational Technology (OT)
    Assessments
  • Product Security
  • Industrial Control System (ICS)
  • Imaging, Extraction, Carving & Indexing of data
  • Review of Analysis of data
  • Cyber forensic investigation and remediation
  • Support for arbitration & litigations
  • Providing testimony for examined
  • forensic evidence
    Reactive Cyber forensics
  • Malware identification & solutioning
Data Protection & Privacy
  • Privacy by design
  • Privacy impact assessments
  • Privacy management systems readiness
  • Privacy compliance assessment towards Indian DPDP, GDRP, CCPA and other Global privacy regulations
  • Created, review, update policies related to privacy requirements of the organisation and geographies of operation.
Skilled member

Our team, many talents

Ashish Mishra

Partner – Cyber Security

Pushpendra Bharambe

Executive Director- Cyber Security