Network Security Certifications
Get Your Business Ready to face the cyber challenge
PGI provides a full range of accredited, certified and bespoke services that assess the resilience of our client’s Cyber Security posture.
From offering you advice on risk mitigation and compliance to helping you implement an Information Security Management System (ISMS) our specialists can help you.
We can provide full support in all aspects of implementing an ISMS. We can also guide an organisation through any and all aspects of obtaining ISO 27001 certification. Including gap analysis, risk management, control implementation and audit and review.
The ISO 27001 standard helps organisations operate in accordance with security best practice. This is achieved through the identification of risks and the implementation of appropriate, cost-effective security controls to mitigate these risks. Subsequently organisations are able to secure their critical information assets, such as financial information, intellectual property, employee details or information entrusted by third parties.
PGI’s data protection consultants provide advice on how to meet the requirements of the UK data Protection Act (DPA) and can support preparations to meet the new requirements that will be introduced under the EU General Data Protection Regulation (GDPR).
Our consultants can provide you with the necessary expertise to implement both technical and procedural controls in order to prevent data breaches, as well as advising how best to fulfil Subject Access Requests (SAR).
PGI’s world class Qualified Security Assessors (QSA’s) have been certified and trained by the Payment Card Industry (PCI) Security Standards Council to carry out client assessments and offer consultancy and advice to companies who handle card data. Whether your company is a large multinational corporation or SME, we can help you meet your PCI DSS requirements
PGI consultants are also equipped with expertise in other recognised information security frameworks and can provide compliance consultancy in line with:
- Center for Internet Security, Critical Security Controls (CIS CSC)
- CESG 10 Steps to Cyber Security
- Cyber Essentials