ISO/IEC 27001:2022 Readiness
Flagship
The global benchmark for information security management. We take you from zero to Stage 2 audit readiness against the 2022 revision — including the updated Annex A control set and mandatory transition requirements.
- Scoping workshop and Statement of Applicability
- Risk assessment methodology and risk register
- Complete ISMS policy suite tailored to your environment
- Control implementation advisory (93 Annex A controls)
- Internal audit and management review facilitation
- Stage 1 and Stage 2 certification support
Typical timeline: 12–18 weeks to Stage 2 audit readiness.
SOC 2 Readiness (Type I & Type II)
AICPA
Preparation for SOC 2 examinations against the five Trust Services Criteria: Security, Availability, Processing Integrity, Confidentiality, and Privacy. We work with your chosen CPA firm and handle the heavy lifting.
- Trust Services Criteria scoping (all five TSCs or subset)
- Control design and mapping to TSC
- Evidence workflow design — collect once, reuse for audits
- Type I readiness (point-in-time control design)
- Type II readiness (operating effectiveness over 3–12 months)
- CPA auditor liaison and walk-through preparation
Typical timeline: 8–14 weeks for Type I; Type II requires an observation window.
GDPR Compliance Programs
EU / UK
For companies processing personal data of European or UK residents. We build pragmatic, defensible data protection programs — not theatre.
- Record of Processing Activities (Article 30 ROPA)
- Data Protection Impact Assessments (DPIAs) for high-risk processing
- Lawful basis analysis and consent design
- Cross-border transfer assessments (SCCs, TIAs)
- Data subject rights procedures
- Data Protection Officer advisory (outsourced DPO available)
India DPDP Act Compliance
India
The Digital Personal Data Protection Act, 2023 changes the compliance landscape for every Indian business. We help you navigate obligations as a Data Fiduciary (or Significant Data Fiduciary).
- Data Fiduciary / SDF classification and scoping
- Notice and consent architecture (valid, informed, free, specific)
- Data principal rights operations
- Data breach notification procedures (72-hour Board reporting)
- Consent Manager integrations where applicable
- DPO / Grievance Officer operating model
NIST CSF & NIST 800-53 Alignment
US / Federal
Cybersecurity Framework alignment for companies selling into US federal, critical infrastructure, or security-sensitive markets. We map your existing controls to NIST functions and plug the gaps.
- Current-state profile against CSF 2.0 categories
- Target-state profile based on business risk appetite
- Roadmap to close priority gaps
- Mapping to 800-53 control families where required
PCI-DSS Readiness
Payments
For merchants and service providers handling cardholder data. We help you achieve and maintain PCI-DSS v4.0 compliance through scope reduction, segmentation, and operational discipline.
- Cardholder data environment (CDE) scoping
- Network segmentation advisory
- SAQ selection and completion support
- Quarterly ASV scan coordination
- QSA engagement liaison for Level 1 merchants
Policy & Control Development
Standalone
Sometimes you don't need a full certification — you need a credible policy stack because a customer asked for one, or because your board requires it. We draft policies calibrated to your environment, not copy-pasted templates.
- Information security policy suite (20–30 policies as needed)
- Acceptable use, access control, incident response, BCP/DR
- Secure development lifecycle, change management
- Vendor / third-party risk management program
- Review cycles, approval workflows, and change tracking
Virtual CISO (vCISO)
Fractional
Fractional security leadership for scale-ups that aren't ready for a full-time CISO hire. Monthly retainer, board-level reporting, hands-on program ownership.
- Quarterly risk strategy and board reporting
- Vendor security reviews and customer security questionnaires
- Incident response coordination
- Security program roadmap and budget advisory
- Direct escalation line for security decisions
Internal Audits
Pre-Cert
Independent, pre-certification internal audits for companies that already have an ISMS in place. We surface real findings before the certification body does — not rubber-stamp what's on paper.
- ISO 27001 internal audit against Annex A and clauses 4–10
- SOC 2 readiness audit against TSC
- Evidence sampling and control operating effectiveness testing
- Written internal audit report and remediation tracker
- Management review facilitation