Cyber Security Consulting
and Training

Cyber Security

Our Cyber Security consulting and training programs give you the necessary knowledge to ensure that safeguards are consistently applied to protect valuable information.

System Review

CVG Strategy will review your organization’s security infrastructure and process controls against the framework as specified in ISO 27001 and NIST 800-171.  Three categories are very critical in a review of existing information technology controls and identifying where you are most vulnerable to cyber threats including risk for attacks.

Cyber Security Critical Categories

  1. Security Architecture – People, Policy, Process
  2. Detective Controls – Management, Monitoring, and Review
  3. Preventative Controls – Technology, Tools, and Techniques


Cybersecurity (CYBERSEC) is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets, [Reference: Definition of cybersecurity, referring to ITU-T X.1205].  Information Security (INFOSEC) – preservation of confidentiality, integrity and availability of information is different from Cyber Security, [Reference: ISO/IEC 27000:2009 definition – Information Security 2.33].  So Cyber Security is the technological approach to mitigating risk and Information Security is the process controls to ensure that data is protected with an effective control system.

For a company to have a viable and active Cyber and Information Security Program it must also have an Information Security Management System (ISMS).  Our Information Security  experts have decades of cybersecurity specific experience and understand how to balance your business’ needs with compliance requirements, risk, and emerging threats.

We recognize that security is a journey, not a destination. We will support your organization in developing a cybersecurity roadmap that ensures compliance readiness, proactive security controls, consistent testing, and continuous improvement.

CVG Strategy’s Information Security Team has implemented several ISO 27001 Information Security Management Systems over the past few years in support of NIST 800-171 protecting small- to medium-sized companies.

What is Cybersecurity?


Cybersecurity techniques can be used to ensure system availability, integrity, authenticity, confidentiality, and non-repudiation. Cybersecurity can be used to ensure that user privacy is respected.  Cybersecurity techniques can be used to establish the user’s trustworthiness.


Wireless networks and voice-over-IP (VoIP), extend the reach and scale of the Internet.  In this regard, the cyber environment includes users, the Internet, the computing devices that are connected to it and all applications, services and systems that can be connected directly or indirectly to the Internet, and to the Next Generation Network (NGN) environment, the latter with public and private incarnations.  Thus, with VoIP technology, a desk telephone is part of the cyber environment. However, even isolated devices can also be part of cyber environment if they can share information with connected computing devices through removable media.


The cyber environment include the software that runs on computing devices, the stored (also transmitted) information on these devices or information that are generated by these devices. Installations and buildings that house the devices are also part of the cyber environment.  Cybersecurity needs to take such elements into consideration.

cyber securityCybersecurity aims at securing the cyber environment, a system that may involve stakeholders that belong to many public and private organizations, using diverse components and different approaches to security. As such, it is beneficial to think of cybersecurity in the following sense:

  • The collection of policies and actions that are used to protect connected networks (including, computers, devices, hardware, stored information and information in transit) from unauthorized access, modification, theft, disruption, interruption or other threats.
  • An ongoing evaluation and monitoring of the above policies and actions in order to ensure the continued quality of security in face of the changing nature of threats.

The enterprise cybersecurity environment


Organizations need to devise a comprehensive plan for addressing its security needs. Security is not one size fits all. Security cannot be achieved by a collection of modules that are interconnected together without a process to plan, manage, review, improve and adjust. Organizations are encouraged to view security as a process. A new way of thinking on how to protect systems, networks, applications, and network services and to contuously evaluate and mitigate risk where possible and appropriately balance against cost.


Security has to be comprehensive across all network layers. Adopting a layered approach to security that, when combined with strong policy management and enforcement, provides security professionals a choice of security solutions that could be modular, flexible, and scalable. Security is difficult to test, predict and implement. Security is not a ‘one size fits all situation. The security needs and the recommended security strategy of each organization is unique and different. For example, an enterprise, a telecommunication provider, a network operator, or service providers each can have a unique set of business needs and may have evolved their networking environment to meet these needs.

Closed enterprise

Uses logical (e.g., frame relay) or physical private lines between sites, remote access provided selectively for employees needing access into the Internet. Web presence is achieved through an Internet data centre provided by a service provider (who is responsible for establishing a secure environment). The organization also provides conventional dial access for remote employees (e.g., working from a hotel). The company uses private e-mail among
employees with no external access. Wireless LANs are also used.

Extended enterprise

This would include telecom providers, network operators or service providers through various business models and can provide support for remote employee and remote office access over IP VPNs over the Internet, or deliver higher speed, lower cost connectivity including general-purpose access into the Internet, such as inter-working between internal e-mail systems and the rest of the world.

Open enterprise

This business model can leverage the Internet by allowing partner, supplier and customer to have access to a enterprise-managed Internet data center, even allowing selective access to internal databases and applications (e.g., as part of a supply chain management system). Internal and external users access the enterprise network from home, remote offices or other networks using wired or mobile devices. As such, the security requirement for such an enterprise is different from other enterprises.

CVG Strategy Cyber Security Consulting and Training

Having a viable cyber security program does more than protect important data, it demonstrates that your company is a trusted partner and maintains customer satisfaction.  Contact us today to engage our experts in your program.

How Can We Help?

Take a look around our site and contact us for more information on how we can help you meet your challenges.

Latest News