Skip to content

The five stages of cybersecurity.

Our Cybersecurity Catalogue is built around the five stages of NIST’s ‘Cybersecurity Framework’. This industry framework is well recognised and respected because it describes the desired outcomes, it’s understandable by everyone, it applies to any type of risk management, it defines the entire breadth of cybersecurity and it spans both prevention and reaction. It aligns perfectly with our offer, because it’s an all-encompassing approach to cybersecurity that covers the whole threat landscape.

Identify

1

1. Identify

  • BCDR planning
  • Security Architecture
  • Risk Management
  • Cyber Asset Management
  • Supply Chain Security
  • Governance and Policy
  • Security Posture Assessment
  • Vulnerability Assessment
  • Phishing Campaign Simulation

Protect

2

2. Protect

  • Security Design and Resilience
  • Vulnerability Management
  • Security Device Hardening
  • Firewall IDPS Management
  • Cloud Security Management
  • Critical Asset Protection
  • Training and Education

Detect

3

3. Detect

Respond

4

4. Respond

Recover

5

5. Recover

  • Security Design and Resilience
  • Vulnerability Management
  • Security Device Hardening

Identify

1

Protect

2

Detect

3

Respond

4

Recover

5

Sections in bold available in the catalogue now.
For all other services, click to discuss bespoke solutions.

Get in touch to find out more

This service is not yet catalogued but we are able to offer a bespoke solution. Please complete the form below and we will get in touch to discuss the service and what a bespoke solution could offer your business.

Why Net Consulting?

  • One of only 7 Palo Alto MDR Partners in EMEA
  • Years of experience working with medium-large organisations, in the most complex and challenging environments at home and abroad
  • UK sovereign SOC
  • Trusted by MoD for over ten years
  • UK Government security clearance consultants
  • List X facility