Consulting Services
Risk analysis, compliance, and cybersecurity strategy consulting
Essential
Essential Consulting Package
(IT Systems)
Project-Based
Current State & Analysis
- IT environment cybersecurity posture assessment (network, systems, users, and processes)
- Baseline risk analysis and risk prioritization
Compliance & Standards
- IT environment compliance consulting (ISO 27001, KVKK — Turkish Personal Data Protection Law, NIST CSF guidance)
- Baseline information security policy drafting
Strategy & Roadmap
- IT cybersecurity roadmap and action plan recommendation
- Short-term security improvement advisory report
Advanced
Advanced Consulting Package
(IT & ICS/OT Systems)
Project-Based
Includes Essential Package scope
OT/ICS Security Analysis
- OT/ICS environment current-state (GAP) analysis and cybersecurity maturity assessment
- OT asset inventory development and critical asset classification
- OT-specific risk analysis (process continuity, access, vendor, and maintenance risks)
Compliance & Policy
- EPDK (Turkish Energy Market Regulatory Authority) Cybersecurity Competency Model compliance work
- OT cybersecurity policy and procedure development under the IEC 62443 framework
Incident Response & Roadmap
- OT-focused incident response approach and role definition
- IT/OT integrated security roadmap and action plan
Comprehensive
Comprehensive Consulting Package
(IT & ICS/OT Systems)
12 Months
Includes Advanced Package scope
Ongoing Managed Consulting
- Monthly follow-up meetings and action plan review
- Quarterly IT/OT cybersecurity maturity assessments
- OT cybersecurity maturity level measurement and KPI tracking
Advanced Analysis & Strategy
- Comprehensive compliance work under the EPDK (Turkish Energy Market Regulatory Authority) Cybersecurity Competency Model
- Advanced OT threat modeling and cyber crisis scenario exercises
- IT/OT integrated cybersecurity architecture design and updates
Training, Audit & Reporting
- IT/OT information security and OT cybersecurity training delivery
- Audit and regulatory process preparation and on-site audit accompaniment
- Periodic cybersecurity posture and risk presentations to senior management
Maintenance & Support Services
Continuous monitoring, system maintenance, and security support services
Essential
Essential Maintenance & Support Package
(IT Systems)
12 Months
Support & Access
- Business-hours support (8×5 help desk)
- Remote basic security incident response
Maintenance & Monitoring
- Basic system maintenance and security patch management
- Periodic system health checks every 3–6 months
- IT infrastructure baseline monitoring and alerting
Advanced
Advanced Maintenance & Support Package
(IT & ICS/OT Systems)
12 Months
Includes Essential Package scope
24/7 Support & Response
- 24/7 available support line
- Rapid remote response for critical incidents
Monitoring & Reporting
- 24/7 IT and OT infrastructure monitoring with automated alert notifications
- Monthly system health and vulnerability reporting
- Periodic health checks for OT/ICS devices
Security Management
- Security device management (Firewall, IDS/IPS basic configuration)
- OT system patch and update management
Comprehensive
Comprehensive Maintenance & Support Package
(IT & ICS/OT Systems)
12 Months
Includes Advanced Package scope
On-Site Support & Response
- On-site support capability and priority response SLA
- Emergency field team deployment for critical OT/ICS incidents
Comprehensive Security Management
- Full Firewall, IDS/IPS, and SIEM management with rule updates
- Monthly comprehensive vulnerability scans and patching planning
- IT/OT asset inventory maintenance and change management
Strategy & Consulting
- Dedicated technical advisor assignment and periodic strategy meetings
- Annual business continuity and disaster recovery testing support
- Quarterly security posture report and executive presentation
Training Services
Comprehensive learning programs from awareness to advanced technical training
Essential
Essential Training Package
(IT Systems)
1 Day
Awareness Training
- General cybersecurity awareness training (all employees)
- Social engineering and phishing attack examples
- Briefing on current attack types and fundamental threats
Basic Security Rules
- Basic IT security rules and best practice examples
- Personal data security and KVKK (Turkish Personal Data Protection Law) awareness
Advanced
Advanced Training Package
(IT & ICS/OT Systems)
Content-Based
Includes Essential Package scope
Technical Team Training
- ICS/SCADA security fundamentals and ICS protocols
- IT/OT network segmentation and security architecture principles
- Cyber incident response procedures and workshop exercises
Tailored Sessions
- Separate training sessions for management, technical teams, and end users
- Cyber hygiene workshops and hands-on exercises
- Participant-specific Q&A and evaluation sessions
Comprehensive
Comprehensive Training Package
(IT & ICS/OT Systems)
Content-Based
Includes Advanced Package scope
Advanced Technical Training
- Hands-on exercises with real cyber attack scenarios (tabletop and field)
- OT penetration testing fundamentals and defensive techniques
- SIEM, IDS/IPS, and EDR solution usage and analysis training
Sector-Specific Content
- Organization- and sector-specific training content (energy, manufacturing, water, logistics)
- EPDK (Turkish Energy Market Regulatory Authority) compliance training and regulatory awareness
- ISO/IEC 27001, IEC 62443, and NIST CSF framework training
Program Management
- Recurring training plan with multiple cycles per year
- Participant certificate tracking and training effectiveness measurement
- Quarterly training needs analysis and content updates
SOC Services
24/7 Security Operations Center — Managed Security Monitoring Service
Managed Service
SOC Package
(IT & ICS/OT Systems)
12 Months (Annual Managed Service)
24/7 Monitoring & Analysis
- 24/7 expert security analyst monitoring service
- Centralized tracking of all servers and endpoints
- Anomaly detection for user and entity behaviors via UEBA
Threat Intelligence & Reporting
- Threat intelligence feed with current attack vector monitoring
- Weekly detailed security incident reporting
- Monthly executive summary report and risk scoring
Incident Response
- Security incident identification, classification, and prioritization
- Incident response coordination and root cause analysis support
- Corrective action tracking and closure verification
No projects were found!
[]
