Security Consulting

Security consulting provided by IGLOO SECURITY,Inc.

Security consulting provided by IGLOO SECURITY, Inc.
comprised of the best experiences and know-how in the field of information security.

IGLOO SECURITY, a leading company in information security is an institution expertizing in implementing information security consulting and positioned to be a evaluation company on personal information influences.

We pursue providing a differentiated value through performing Consulting customized to customers by consultant group with the highest competency and rich experience.

IGAM(IGLOO SECURITY Assessment Methodology)

  • IGAM (IGLOO SECURITY Assessment Methodology) is the fundamental methodology of consulting business department that have been verified by many projects carried out by IGLOO SECURITY.

IGAM has the following advantages

  • Improves understanding of customers in business

    • - Structure and deliver key value of security risk based on sufficient understanding in customer business
  • Restructures methodology to suit business

    • - Realize lower methodology by form of information protection Consulting business after structuring WBS of master level
    • - Reorganize or restructure to suit the property of the project for all analysis and application techniques of lower methodology
  • Systematic Assessment

    • - Apply various qualitative and quantitative risk analysis theories in order to obtain analysis results that are closest to the actual according to the process and asset protection methodology of the customers.
100 Project Setup, 200 As-Is Anaysis, 300 Risk Assessment, 400 To-Be Modeling, 500 Master Planning, 600 Security Control
  • 100 Project Setup
    • 110 Discover security requirement
    • 120 Performing strategy
    • 130 Prepare milestone
    • 140 Advance training of implementation team
    • 150 Start project
  • 200 As-Is Anaysis
    • 210 Analyze management environment
    • 220 Confirm security target
    • 230 Analyze best practice
    • 240 Analyze asset
  • 300 Risk Assessment
    • 310 Select assessment standard model
    • 320 Risk analysis
    • 330 Analyze vulnerability
    • 340 GAP analysis
    • 350 Risk assessment
    • 360 Analyze countermeasures
  • 400 To-Be Modeling
    • 410 Deduce improvement task
    • 420 Establish security measures
    • 430 Design management security system
    • 440 Design technological security system
  • 500 Master Planning
    • 510 Select improvement task
    • 520 Establish implementation task
    • 530 Set priority
    • 540 Establish implementation plan
    • 550 Establish change management plan
  • 600 Security Control
    • 610 Implement security
    • 620 Technology transfer and training
    • 630 Diagnose implementation
    • 640 Regular vulnerability check
    • 650 SDLC-based inspection
    • 660 Security Monitoring
    • 670 Change management

Utilization Area of IGAM

Utilization Area of IGAM Methodology, 01 As Is Analysis 02 Risk Assessment, 03 Modeling, 04 Security(Risk) Control / Regulation, Compliance
  • Establish information security management system

    Establish information security
    management system

    • Establish personal information security management system
    • Establish technological security system
    • Establish information security management system
  • Information security diagnose consulting

    Information security diagnose consulting

    • Inspect vulnerabilities of information system – Server, network, DBMS, WEB, WAS
    • Development security (source code)
    • Reflect latest security technique
  • Information communication infrastructure Consulting

    Information communication
    infrastructure Consulting

    • Comply with information and Communication Infrastructure Protection Act
    • Provide procedure for preventing overlap or omission of controlled items proposed by relevant law
  • Influence evaluation of personal information

    Influence evaluation of personal information

    • Based on Personal Information Protection Act
    • Provide procedural confidence to prevent overlap or omission of controlled items proposed by the relevant law
  • Risk management

    Risk management

    • Reflect information protection momentum centered around process focused on assets
    • Expand alignment Consulting area between Biz and security
  • Supportive Consulting for acquiring authentication

    Supportive Consulting for acquiring authentication

    • Reflect information protection momentum centered around process focused on assets
    • Expand alignment Consulting area between Biz and security