











We are your extended cyber security team providing business-aligned advisory, professional and managed services to support your cyber security program. Our business focused security professionals work round the clock to keep your cyber adversaries at bay.
Below are some of the job functions performed by Digiss under the full stack cyber defense support agreement
The capability map below shows major activities that are associated with each of the ten (10) cyber security domains covered under our cyber defense support agreement.
The capability map below shows major activities that are associated with each of the ten (10) cyber security domains covered under our cyber defense support agreement.
Digiss Tailored Solution | Essentials |
Enhanced |
Complete |
---|---|---|---|
GOVERN - The organization’s cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored | |||
Cybersecurity Strategy | ✓ | ✓ | ✓ |
Security Policy | Single Overarching Infosec Policy | Up to 5 issue-Specific Policies | Al Relevant Infosec Policies |
Oversight Functions | Up to 1 hour per month | Up to 4 hours per month | Up to 8 hours per month |
Vendor Risk Management | Not covered | Up to 5 vendors per annum | Unlimited vendors |
Identify - The organization’s cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored | |||
Asset Management | Basic Support | Enhanced support | Total support |
Vulnerability Assessment and Penetration Test (VAPT) | Annually(External only) | Quarterly | Monthly |
Ongoing Risk Assessment | - | Annual report | Quarterly report |
Program Improvement Initiatives | - | Basic support | Enhance support |
Digiss Tailored Solution | Essentials | Enhanced | Complete |
---|---|---|---|
GOVERN - The organization’s cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored | |||
Cybersecurity Strategy | ✓ | ✓ | ✓ |
Security Policy | Single Overarching Infosec Policy | Up to 5 issue-Specific Policies | All Relevant Infosec Policies |