iSecurity Consulting is an organization specialized in providing consulting and advisory services with a unique focus on privacy, information security, & risk management in Ontario's health care sector.
We have developed innovative & comprehensive approaches to help a number of organizations excel in the areas of:
RISK MANAGEMENT, PRIVACY & SECURITY ASSESSMENTS
- Threat Risk Assessment (TRA)
- Privacy Impact Assessments (PIA)
- Technical Vulnerability Assessment & Penetration Testing
- Web Application Vulnerability & Penetration Assessment
- Privacy & Security Health Check
PRIVACY & SECURITY PROGRAM DEVELOPMENT
- Privacy & Security Program and Framework Development
- Privacy & Security Policy Creation
- Privacy & Security Education, Awareness & Training
- Incident Response & Process Development
ENTERPRISE SECURITY ARCHITECHTURE, ACQUSITION & IMPLEMENTATIONS
- · Enterprise wide privacy & information security architecture, plans & design
- · Plan, design, acquire & implement information security products & solutions such as:
- Security Information & Event Management (SIEM) technologies
- Intrusion Detection & Intrusion Prevention Systems (IDPS)
- Data Encryption Solutions
- Identity & Access Management Solutions (IAM)
INDUSTRIAL CONTROL SYSTEM
- TECHNICAL ARCHITECTURE DESIGN AND IMPLEMENTATION SERVICES
Developing Industrial control systems transcends regular IT, it requires an engineering mindset. iSecurity has a team of highly skilled and experienced engineers that have developed embed and industrial control system for rail signaling and air craft systems, and data storage solution.
iSecurity Consulting understand the challenges and limitations of developing software to devices with limited power, storage and that often only supported to older versions of operating system and drivers. We have developed techniques for securing older platform and implementing embed security devices to protect the Internet of Things (IOT).
COMPLEX HANDSHAKE AND SECURE PROTOCOLS
iSecurity engineers have design and validated complex real-time protocols for security and operation and control of trains. Race conditions and time analysis is one of the many challenges our engineers have to overcome to provide secure, reliable and safe systems.
FULLY REDUNDANT AND COMPLEX NETWORK
Beyond IT high availability and redundancy, iSecurity has the expertise and knowledge to design and develop complex network solution that also take into account low latency and high packet loss environments constraints.
BIG DATA AND LOGGING AND AUDITING SYSTEMS
We have developed innovative Big Data solution for the creation of logging, monitoring and auditing and record keeping. We have use open source tools such as Storm, Kafta, and Elastic Search to handling large volumes of messages and provide indexing and searching capabilities.
PRIVATE DATA STORAGE
We have assist companies select private cloud solution to meet their needs and to develop a secure design network authentication and authorization model for multi-tenant and multi user use cases.
PRIVATE DATA STORAGE
We have fully embedded security best practices throughout our software development lifecycle. This not only ensure a secure but reliable solution to our customers industrial and critical infrastructure systems.