Skip to main content
Please wait...

Cyber Security Advisory

There was a time when cyber-attacks were rarely heard of and we knew of only a handful of companies who were victims.

In today’s time, cyber-attacks have become very common. Almost every week we read about a company’s data being breached and sold on the Dark Web or the systems being hacked and hackers extorting ransom to give the controls/data back to the company.

Why Cyber Security Framework are Unique

1. Each industry and each enterprise within it will have differing priorities..

2. Each Application and each database/server is uniquely configured

3. Each hacking technique is unique in some way.

4. BFSI should adopt leading framework to evaluate their preparedness

    ➢ Example RBI directives to Banks in India.

    ➢ Cyber Security must be DIFFERENT & SEPARATE from the banks regular Technology & IT Security.

5. ISO 27 K best practices. ISO 31000 implementation or COSO 2013 guidelines adherence, as you move towards certification

Riskpro Capabilities

Riskpro has a team of more than 12 information security professionals who have deep cyber security and information security experience. Riskpro has done more than 150+ SSAE/SOC1 and SOC 2 audits, all of which require assessment of a company’s security practices. Riskpro and its team members have executed several Information Security, Data Protection Assessments. Riskpro has adopted AICPA, CSA, NIST and other leading framework to evaluate and assess cyber security measures. Our risk management experience helps to identify security loop holes and to help mitigate these. 

Cyber Security Risk - How Riskpro can help

AICPA Cyber Security Risk Management Framework

Cyber Security Policy

  1. Develop board approved Cyber Security Policy and Cyber Crisis Management Policy
  2. Establish governance to address cyber risks
  3. Align to Best practices

Inventory of Cyber Risks

  1. Develop Risk register specific to cyber threats
  2. Identify gaps in network security and IT access control risks

Continuous monitoring (SOC) 

  1. Perform independent Cyber-Risk audit services assessment
  2. Support on SOC operations.
  3. VA/PT services

NIST Cyber Security Risk Management Framework

Cyber Crisis Management Plan

  1. Board approved CCMP
  2. Testing of CCMP on an annual basis
  3. Diagnostic gaps in Crisis Management Framework

  Cyber security indicators

  1. Develop Key Risk Indicators to track risks and preparedness
  2. Periodic audit of cyber threats and report testing to Risk Committees

Cyber-security awareness Trainings

  1. 2 Days awareness trainings across Institution
  2. Online E Learning modules for mass awareness
  3. Reasonable training fees per participant or per day rates

What and Why of Cybersecurity Audit


  1. 2-3 days comprehensive review of your cybersecurity controls to determine gaps in your cybersecurity framework
  2. We use leading frameworks such as NIST, CAIQ, AICPA, RBI etc to determine your maturity level.
  3. Gaps are highlighted to the management along with recommendations
  4. Two readiness / compliance audit report are issued
  • Summary Report that can be shared with customers
  • One page certificate for customers
  • Detailed for internal use


  1. For a small fee, you get a full visibility in the gaps that your systems
  2. You get to benchmark yourself to global standards
  3. You get a tangible report / certificate that you can share with your clients.
  4. You proactively manage cyber risks and prevent cyber security incidents

To know more contact us at