Cybersecurity Maturity Assessment

White Label Consultancy’s premium cybersecurity offering

GET STARTED WITH A FREE CONSULTATION

arrowCybersecurity

An organisation’s security posture requires regular evaluation. WLC can provide an objective assessment of your cybersecurity maturity in light of rapidly changing laws and regulations.
Our digital assessment is delivered by industry-leading experts. It provides feedback on your organisation's maturity based on industry standards and the current regulatory framework.
Our maturity assessment presents a holistic internal assessment of all IT applications and infrastructure, their existing security and privacy controls in place and the intended maturity levels, risks identification and prioritisation and implementation recommendations to achieve the target ambition.  
WLC has extensive experience providing maturity assessments and managing cybersecurity requirements in Europe with a growing presence in the United Kingdom and the Middle East. 

What can a cybersecurity maturity assessment accomplish for your organisation? 

Assess your current security maturity levels across your organisation.  
Drive security initiatives to grow cybersecurity skills and resources and implement security solutions as per strategy.  
Determine target maturity levels desired for your organisation based on industry requirements.  
Assess your business processes against with domestic, regional, and international standards and frameworks (e.g. ISO/IEC:27001:2022, NIS2 Directive, NIST Cybersecurity Framework 2.0, NSM Grunnprinsipper 2.0 and others). 
Understand your organisation’s supply chain and third-party risks.  
Tailor the organisation’s cybersecurity strategy in alignment with the organisation’s risk appetite.  

Conduct a Comprehensive Cybersecurity Maturity Assessment and Improve Your Security Posture in Three Phases Your Organisation

1.

Discover

arrow

Perform a Cybersecurity Maturity Assessment for your entire organisation and all business units based on international standards and frameworks (e.g., ISO27001 and NIST CSF) and applicable laws and regulations (e.g., the NIS2 Directive).  

arrow

Perform an “outside-in” Digital Risk Assessment for your entire organisation based on open sources and commercially available cyber risk services, identifying key risks, threats, and vulnerabilities exposed to the Internet and advising on remediations. 

2.

Strategise

arrow

Define a Target State and perform a Gap Assessment to identify key gaps in terms of governance and capabilities.​ 

arrow

Define a Roadmap to address identified gaps to reach the required Target State within a defined timeframe (e.g., 12-18 months).  

arrow

Advise on the implementation of security capabilities, such as architecture, tools, services, and competencies. ​ 

3.

Execute

arrow

Support the implementation in the capacity of “CISO-as-a-Service”, by providing regular executive security reports (e.g., quarterly), annual risk assessments, annual compliance assessments, and an annual Board of Directors report.

arrow

Monitor the execution of the Security Roadmap, including the implementation of Group Security Governance and security capabilities, as outlined in the Gap Assessment.​ 

Contact us

Our Cybersecurity Team

André Årnes

André joined WLC as a Partner in January 2022, after having served 7 years as the Global CSO of Telenor Group. He has 20+ years of experience within security leadership, cybersecurity, and digital forensics. His previous work experience covers working as CIO in Telenor Global Shared Services, Senior Principal Consultant for Security Architecture with Oracle, and Special Investigator for the Norwegian National Criminal Investigation Service. André is also a part-time Professor at the Norwegian Technical University (NTNU) Department of Information Security and Communication Technology.

Kevin K.K. Khoo

Prior to WLC, Kevin has 28+ years of experience in IT and information security, from consulting, management, implementation, and operations to shared services. He is well versed with the telecommunications sector during his stint at Telenor Group, held multiple roles in global shared services and business unit operations, with strict security requirements. Other sector experiences include manufacturing, public services, financial services, and eCommerce. His consulting credentials include complex project and technology executions from SAP to Microsoft’s Digital Workplace solutions within Asia, the EU, and the Nordics. As the architect of WLC’s Cybersecurity Maturity Execution (CME) Framework, he works with global, regional, and local security standards such as ISO/IEC 27001, and NIST Cybersecurity Framework. NIS2 Directive, CIS Controls, etc. Kevin is a certified ISO/IEC 27001 Lead Implementer (B.S.I.) and INSEAD Strategy Execution Programme Certificate (Distinction).

Meredith Primrose Jones

Meredith Primrose Jones is a legal and cybersecurity professional with a Master of Laws in International Security Law from the Australian National University. Before joining WLC, Meredith worked at top Australian universities as a Researcher and a Lecturer of Law. Areas of law Meredith taught across included cyber law, privacy, artificial intelligence, and technology law. Whilst focused on cybersecurity, Meredith’s research has been published in the fields of cyber and hybrid warfare. She actively contributes to reports relating to warfare, cybersecurity, and hybrid threats and remains closely affiliated with the Centre for Cybersecurity Research and Innovation at RMIT University in Melbourne. Meredith has also had experience in writing government submissions relating to cybersecurity practices and high-level reports detailing recommendations for improved cybersecurity capacity building and legislative reform.

Alisa Mujanic

Alisa joins WLC from Sopra Steria, where she has been section manager for cybersecurity and Splunk, and she has broad experience across multiple roles within cybersecurity at strategic and leadership levels. She has strong analytical and communication skills and is highly focused on bridging gaps between teams and subject areas. She brings a holistic perspective and an action-oriented approach. She has gained extensive and global experience from Telenor Group, where she was the project manager for one of the largest global strategic cybersecurity projects and acted as the Business Security Officer for the Telenor Group Units. Alisa takes a particular interest in the intersection between security, technology, and policy and has represented Telenor at the United Nations’ Open-Ended-Working-Group on Security, and initiated and led several internal activities on cybersecurity regulation.

Leave us a note and we will get back to you as soon as we can!
First Name
Last Name
Email
Company Name
Description