
Services
PO Consulting’s capabilities centre around risk assessment & management, systems engineering, operational management and review, and security compliance. We offer a blend of services which are flexible and can be adapted to clients’ individual need.

Cyber Risk Integration
Risk Management is a fundamental aspect of operations in ALL contexts of organisational execution, no matter what the mission is. Ensuring it is effective and encompasses all aspects of risk is critical.

Incident Response
PO Consulting has discharged the role of incident managers on a number of incidents in which we have demonstrated clear value in the closing of that incident. Our approach is to enact the prevailing incident management process authoritatively.

ISO27001 Support Services
PO Consulting has contributed to BS7799 and the ISO2700X series of standards as they evolved from a code of practice to the standards that exist today.

OPSEC Support
PO Consulting is experienced in designing secure governance systems which are compliant to peer group reviewed frameworks such as ISO27001.

Security Accreditation Support
Security Accreditation is the action of forming an informed judgement that the INFOSEC risk in the operation of a system is manageable and within organisational risk tolerance. This decision is one that should be discharged implicitly or explicitly for all systems.

Security Operations Centre
PO Consulting has experience in the implementation of SOC architectures; the required functional elements of a good SOC, the need for external links with partners and feeds, and prevailing good practice guidance.

Security Review Services
PO Consulting has a wealth of experience in the Information Security arena. We encourage our clients to use that experience according to their need.

Security Systems Engineering
At PO Consulting, we are engineers at heart, with experience in a wide diversity of systems which have been developed using a variety of development lifecycles. Our aim is to cut through complexity to decompose problems into manageable simple components which are therefore simple to assure from a security perspective.
