Ethredix Ethredix
CS

Security Consultations

Expert cybersecurity consulting for strategic decision-making and security program implementation.

Strategic Consulting

Assistance with security roadmap creation, technology selection and security team building.

Technical Consulting

Solving specific security issues, code review, application architecture.

Compliance

Support in audit preparation, ISO 27001, GDPR, NIS2 implementation.

Consulting Areas

Security Program Development

Design and implementation of comprehensive security program tailored to your organization size and needs.

Security policies, procedures, security governance framework

Vendor Selection

Assistance with selecting right security vendors - SIEM, EDR, penetration testing, managed services.

RFP preparation, vendor evaluation, contract negotiation

Security Architecture Review

Assessment of current security architecture and improvement proposals - network segmentation, zero trust, defense in depth.

Architecture diagrams, threat modeling, security controls mapping

DevSecOps Implementation

Security integration into CI/CD pipeline - SAST/DAST, dependency scanning, container security.

GitLab/GitHub security, pipeline automation, shift-left approach

Incident Response Planning

Creating incident response playbooks, tabletop exercises, team readiness assessment.

IR procedures, communication plans, forensics readiness

Cloud Security Strategy

Secure cloud migration, multi-cloud security, landing zone design.

AWS/Azure/GCP best practices, IaC security, CSPM implementation

Compliance and Standards

ISO 27001

  • → Gap analysis and readiness assessment
  • → ISMS implementation
  • → Risk assessment methodology
  • → Certification audit preparation

GDPR

  • → Privacy impact assessment
  • → Data mapping and classification
  • → Incident response procedures
  • → Vendor due diligence

NIS2

  • → Applicability determination
  • → Security measures implementation
  • → Incident reporting procedures
  • → Supply chain security

PCI DSS

  • → Scope definition
  • → SAQ completion support
  • → Network segmentation
  • → QSA readiness preparation

Consulting Formats

One-time Consultation

2-4 hour session focused on specific problem or question.

  • • Quick wins identification
  • • Technical problem-solving
  • • Architecture review

Project-based Consulting

Multi-week engagement with defined deliverables.

  • • Security program build
  • • Compliance implementation
  • • Tool deployment support

Retainer

Monthly hour allocation for ongoing support and ad-hoc consultations.

  • • Virtual CISO
  • • Security team augmentation
  • • Strategic advisory

Deliverables

Strategic Documents

  • → Security roadmap
  • → Budget recommendations
  • → Risk register
  • → Maturity assessment

Technical Documentation

  • → Architecture diagrams
  • → Implementation guides
  • → Runbooks and playbooks
  • → Configuration templates

Policies and Procedures

  • → Security policies
  • → Standard operating procedures
  • → Compliance frameworks

Knowledge Transfer

  • → Team workshops
  • → Hands-on training
  • → Documentation handover