Governance, Compliance & Risk Management

Successfully manage the security of your most valuable asset - information - by introducing structure and control into your information management processes. Protect your critical data throughout its lifecycle in a structured manner that meets corporate, legal and regulatory requirements by taking advantage of Odyssey's comprehensive Information Security Governance, Compliance, and Risk Management service portfolio.

Business Impact Analysis

A Business Impact Analysis is an essential component of an organization’s business continuity management process. Its aim is to identify potential risks which could impact organizational operations, and quantify the potential financial and business impacts such risks could impose.more...

Disaster Recovery/ Business Continuity Planning & Management

The increasing reliance of businesses on the availability and proper functioning of their systems and technologies means that managers may no longer ignore the need to design and implement a Business Continuity Management framework, including supporting Disaster Recovery Plans.more...

Ethical Hacking (Penetration Testing)

An Ethical Hacking exercise is a simulation of real life attacks and usually involves authorized persons’ use of attacking methods simulating hostile intruders’ or hackers’ techniques. These exercises focus on the external perimeter of the organization.more...

Incident Response & Digital Forensics

The increasing volume and complex nature of electronic threats presents a constant challenge to organizations’ capability to identify and understand when they are the subject to a threat or attack.  But even when they are able to identify such incidents, determining the most effective and appropriate course of action, is not always clear.more...

Information Security Gap Analysis

Gap analysis is a formal study of where an Organization is currently standing regarding its Information Security vs. where it should have been or wants to be in the future.more...

Information Technology/ Information Systems Internal Audit

The ability to perform Information Technology (IT) control and Information Systems (IS) audits requires a combination of (a) deep understanding of various infrastructure and application components and (b) strong auditing credentials and methodologies.more...

ISO 27001 Implementation

ISO 27001 is the internationally recognized Standard for Information Security and Risk Management, designed to provide organizations with a comprehensive framework and best practice guidance towards implementing an Information Security Management System (ISMS).more...

PCI Assessment and Implementation

The Payment Card Industry (PCI) Data Security Standard (DSS) is a multifaceted security Standard that includes requirements for security management, policies, procedures, network architecture, software design and other critical protective measures.more...

Risk Assessment

Risk assessment is the determination of quantitative value of risk related to a concrete situation and a recognized threat. Our risk assessment services are designed to help you identify areas of current risk and the prioritization of effort in designing and implementing control mechanisms to address those areas based on a cost-benefit analysis and within the context of the organization’s size and business.more...

Security Training & Awareness

Organizations are investing significant financial resources in implementing technical security solutions in order to contain, minimize or even eliminate risks.  At the same time, these same organizations fail to adequately considermore...

Vulnerability Assessment

The main difference between an Ethical Hacking exercise and a Vulnerability Assessment, is that while the first relates to the simulation of an attack from the outside, the second relates to an attack that may be perpetrated on the internal side of the organizational network e.g. a disgruntled employee, or an external attacker who has gained access into the network. more...