Other SBUs of FISST
4 Pillars – the SBUs of FISST
![](https://fisstacademy.com/wp-content/uploads/2023/10/Jarvis-icon-2@2x-1.png)
Training
![](https://fisstacademy.com/wp-content/uploads/2023/10/Jarvis-icon-1@2x.png)
Consulting
![](https://fisstacademy.com/wp-content/uploads/2023/10/Jarvis-icon-4@2x.png)
Services
- Data Centre
- SOC
![](https://fisstacademy.com/wp-content/uploads/2023/10/Jarvis-Icon-7@2x.png)
Cyber R.I.G. Solutions
Consulting SBU
![](https://fisstacademy.com/wp-content/uploads/2023/11/analysis.png)
Gap Analysis
![](https://fisstacademy.com/wp-content/uploads/2023/11/vulnerability.png)
VA & PT
![](https://fisstacademy.com/wp-content/uploads/2023/11/application.png)
Application Security Audit / Assessment
![](https://fisstacademy.com/wp-content/uploads/2023/11/data-security.png)
Data security & Policy Audit
![](https://fisstacademy.com/wp-content/uploads/2023/11/computer.png)
Cyber Insurance Consulting
![](https://fisstacademy.com/wp-content/uploads/2023/11/cyber-security-1.png)
Network Security Assessment
![](https://fisstacademy.com/wp-content/uploads/2023/11/risk.png)
Incident Management
![](https://fisstacademy.com/wp-content/uploads/2023/11/analysis-1.png)
GRC - Design & Audit
![](https://fisstacademy.com/wp-content/uploads/2023/11/puzzle-piece-1.png)
BC & DR - Design & audit
![](https://fisstacademy.com/wp-content/uploads/2023/11/forensic.png)
Digital Forensics
Data Centre Services
Back-up
To securely protect programs,
applications, systems and other
electronic data
applications, systems and other
electronic data
Security Testing Environment
Conduct highly efficient and
effective security testing.
effective security testing.
Environment Utility Services
We host test environments and Lab
Disaster Recovery
Develop, implement and regularly
test an efficacious DRP
test an efficacious DRP
Business Continuity Planning
Create a comprehensive business
resiliency strategy and develop
a flexible BCP
resiliency strategy and develop
a flexible BCP
SOC as Service
![](https://fisstacademy.com/wp-content/uploads/2023/11/icon-6.png)
Infrastructure Security Monitoring
- Log Analysis and Correction
- Event and Health Monitoring
- Assets Identification and Prioritization
- Infra Security Audit
- Automated Asset Discovery and Service Mapping
- Network Devices Config Backup
![](https://fisstacademy.com/wp-content/uploads/2023/11/icon-1-2-1.png)
Security and Vulnerability Management
- Scheduled external Vulnerability scans
- Phase 1 Vulnerability Analysis
- Phase 2- Advance Vulnerability Analysis
- Recommendations for Security Patch Management
![](https://fisstacademy.com/wp-content/uploads/2023/11/icon-8.png)
Attack Detection/ Analysis
- Automatic Attack and Breach Detection
- SOC Triage
- Threat Hunting
- Attack Vector Identification
- Security Vulnerability Exposure
- Impact Analysis
- Reports
![](https://fisstacademy.com/wp-content/uploads/2023/11/icon-5.png)
Forensic Analysis
- Network Forensics
- System Forensics
- Endpoint Forensics
![](https://fisstacademy.com/wp-content/uploads/2023/11/icon-7.png)
Reports/ Recommendations/ Awareness
- Change Recommendations and Workarounds
- Improvements for Future Mitigations
- Monthly Security Awareness Training