| IT ASSURANCE |

ISO 27001

Gold

Achieving world-class compliance

We draw on our pragmatic approach and experienced consulting teams made up of BSI certified ISO 27001 Lead Implementers and Auditors, Risk Management and Privacy consultants, Cloud Security experts, to develop world class processes alongside achieving a world renowned certification.

ISO 27001 with RightCue – Difference

Simplicity

With focus on business strategic objectives, we ensure your Information Security Management System (“ISMS”) is easy to understand and put to practice. We also equip you with technical solutions to maintain your ISMS year after year.

Complete solution

Going beyond a standard implementation, we include as appropriate, elements from ISO 27017 (security for cloud service customers), IASME governance (personal data inventory and flows), Cyber Essentials (Technical security Controls), CIS tops 20 (Industry benchmark)

Minimum disruption

Implementing ISO 27001 is a big change to ways of working. Our practical approach offers an informed opinion of your current security posture to identify what is already working well and what areas require improvement.

Personal attention

We work closely with you at every step of the process to embed the governance throughout the organisation and guideCue you towards a successful certification.

ISMS that works for you

We work coherently with your business and IT teams to deliver

GAP ASSESSMENT

We understand your current maturity, business goals to provide a risk-based remediation plan outlining in practical terms effort required for implementation.

PLANNING

We equip you with documentation and tools specifically tailored for your business and organisational cultural with all you need to put in place an ISMS.

RISK ASSESSMENT

We use this key activity to empower the decision makers in your organisation and align the ISMS to business goals and priorities, making sure it remains effective and meets your security needs.

GAP ASSESSMENT

We understand your current maturity, business goals to provide a risk-based remediation plan outlining in practical terms effort required for implementation.

PLANNING

We equip you with documentation and tools specifically tailored for your business and organisational cultural with all you need to put in place an ISMS.

RISK ASSESSMENT

We use this key activity to empower the decision makers in your organisation and align the ISMS to business goals and priorities, making sure it remains effective and meets your security needs.

IMPLEMENTATION

Tied in with risk assessment, we provide practical guidance in implementing Annex A controls which draws from our understanding of various technology platforms, security tools, international best practices, applicable rules and regulations.

INTERNAL AUDIT

An in-depth objective assessment of the working of your ISMS to ensure it meets the requirements of the standard, your ISMS framework and business requirements.

CUSTOMER SERVICE

We can assist you with project managing the whole process, liaise with external auditors and other stakeholders, ushering you to successful certification.

IMPLEMENTATION

Tied in with risk assessment, we provide practical guidance in implementing Annex A controls which draws from our understanding of various technology platforms, security tools, international best practices, applicable rules and regulations.

INTERNAL AUDIT

An in-depth objective assessment of the working of your ISMS to ensure it meets the requirements of the standard, your ISMS framework and business requirements.

CUSTOMER SERVICE

We can assist you with project managing the whole process, liaise with external auditors and other stakeholders, ushering you to successful certification.

What our clients think

grey line
“Great communication between us, fast deliveries, and quality consultation and templates. We were very happy to work with you from the start of the project.”

CECILIA WIK, DETECTIFY

Get in touch with us

If you would like help with managing data privacy business, then please call us on

+44 (0)1256 406 601

LinkedIn   Twitter   Facebook

Please accept [renew_consent]%cookie_types[/renew_consent] cookies to watch this video.