Third Party Connection Management advisory for British Bank Connection Management

Purpose of this engagement is to consolidate the support of all the third-party connections under a central Global team with a centralized database, a common support process, standardized service level agreement and define support strategy for global third-party connections.

Behalf authorized vendor eCyLabs proposed an end-to-end support model in terms of people, process and technology including Market research and provided insight about overall tools that required to run third-party lifecycle, A detailed control matrix documented with roles and responsibilities of teams involved and evaluation of tools for third-party connections management.

SIEM advisory engagement for middle east airport SIEM

Independent consultant to conduct assessment of existing SIEM solution deployment including DR setup and provide recommendations. Develop transformation program to fix the top key issues to address the major technology and process loop-holes.

Conducted detailed assessment of existing SIEM deployment including DR setup, processes, capabilities, architecture, and stakeholder interview and business case analysis. Produced recommendation report to business executive that helps to take informed business decision to realize the returns from existing investment and keep the business secure from attack vectors. Proposed transformation program to re-design the architecture, enable advanced use cases, documentation of SOC processes, run books and standard operating manuals.

Cyber vault CoE enablement for African university Cyber vault

Design & Develop Cyber security CoE Lab Infrastructure equipped to offer services including forensics, ethical hacking and cyber range programs .Develop knowledge base for the students to undergo basic trainings.

Due diligence helps to identify the key outcomes, objectives and budget considerations .Plan, design, deployment, configuration of solution components to offer programs such as forensics, ethical hacking and cyber range trainings. Development of course schedule, lab run books, auto provision, orchestration and API integration of cyber security applications for ease of use purpose. Auto decommission of virtual machines post completion of course modules.

Forensic Investigation Forensic Investigation

eCyLabs was engaged to investigate data theft in Structural Company, eCyLabs focused on collecting and analysing data from computer systems to track user-based activity including possibility of user upload to cloud storage services.