Services - IS Strategy

By: Axenic  06-Dec-2011
Keywords: Information Security, Security Strategy, Information Security Strategy

Services - IS Strategy

A robust information security strategy is the foundation of security within an organisation. It is essential to align the information security strategy with the overarching business strategy to ensure the organisation’s business objectives are fully supported. Our approach to security strategy after establishing the business context is to define control objectives, identify and assess controls that meet those objectives, select appropriate controls and establish measures to assess their effectiveness. This approach enables us to help our clients establish cost-effective information security that best supports their business.

Keywords: Information Security, Information Security Strategy, Security Strategy,

Contact Axenic

Email - none provided

Print this page

Other products and services from Axenic


Services - Overview

Having a defined enterprise security architecture and standard platform for system deployment can eliminate most of the security debate when deploying a new application, or connecting a new office, into your environment. Risk Management can assist you to understand the value of your information assets and the consequences to your business should they be compromised, enabling you make informed decisions on how to protect them.


Services - Risk Management

We believe that the risk profile and appetite of any organisation is unique, so our risk assessment methodology, based on New Zealand Standard AS/NZS ISO 31000, focuses on assessing and prioritising risks within your business context. We understand that effective risk management provides organisations with a high degree of confidence that their risk exposures are being identified and properly managed.


Services - Controls Audit

Information system controls audits identify configuration and management weaknesses that can expose an organisation to unnecessary risks.


Services - Security Architecture

Our methodology enables us to help clients define and understand their business security requirements to ensure that their security architecture and roadmap meet those requirements. We design cost-effective security solutions that provide the appropriate technical controls to meet the organisations strategic or tactical goals.


Services - IS Governance

We can map the findings to your preferred information security framework and can assist in development and implementation of information security governance frameworks. We assess the maturity of your information security governance processes and procedures to ensure they fully support your organisation’s strategy and policy.


Services - Security Policy

We have extensive experience in developing information security policies that clearly articulate management’s strategy to ensure that it is communicated and consistently applied across the organisation thus establishing and developing an information security culture. Our methodology is based on international standards and frameworks including ISO 27001/27002 and CoBIT 4.1.