SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Ajax StarterKit Plus

    Ajax StarterKit Plus

    VIVOTEK  Indoor Dome Camera

    VIVOTEK Indoor Dome Camera

    Dahua Technology 50m Security Radar

    Dahua Technology 50m Security Radar

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Omnigo Software Security and Risk Management System installed by major casino operators in Macau, China
    • Hanwha security cameras aids Convergint Technologies in protecting the Philadelphia Holocaust Memorial Plaza
    • Maxxess eFusion integration with Traka explore advancements in key and equipment management
    • Maxxess integrates OpenEye Web Services with its eFusion security management software
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Security bytes
    • Round Table Expert Panel
    • Year in Review 2018
    • Year in Review 2017
    Featured
    • Top ten security industry mergers and acquisitions of 2019
    • MOBOTIX M7 platform provides more flexibility and computing power
    • ATMs provide convenience for bank customers, but they have vulnerabilities
    • What if a customer expects more than a security system can deliver?
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Arecont Vision cameras utilised for city surveillance in Mankato, Minnesota

    Arecont Vision cameras utilised for city surveillance in Mankato, Minnesota

    MOBOTIX announce The Cactus Concept to offer greater protection from cyber-threats

    MOBOTIX announce The Cactus Concept to offer greater protection from cyber-threats

    Vanderbilt’s SPC Connect helps monitor buildings for Odense council, Denmark

    Vanderbilt’s SPC Connect helps monitor buildings for Odense council, Denmark

    Dahua delivers cameras, monitors and switches for surveillance of city centre in Lincoln

    Dahua delivers cameras, monitors and switches for surveillance of city centre in Lincoln

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Upcoming Events
    • IFSEC India 2019
    • 2019 China Smart Homes & Buildings Expo
    • Intersec Dubai 2020
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    2019 China Smart Homes & Buildings Expo

    2019 China Smart Homes & Buildings Expo

    Oman Facilities & Environment Exhibition & Conference 2020

    Oman Facilities & Environment Exhibition & Conference 2020

    Kuwait Health Safety & Environment Forum 2020

    Kuwait Health Safety & Environment Forum 2020

    Third Party & Supply Chain Cyber Security Summit 2020

    Third Party & Supply Chain Cyber Security Summit 2020

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID Global
    • Nedap Security Management
    • ASSA ABLOY EMEA
    • FLIR Systems
    • Hanwha Techwin America
    Other Resources
    • Videos
    Topics
    • Artificial intelligence (AI)
    • Cyber security
    • ISC West
    • Counter Terror
    • Robotics
    • Body worn video cameras
    Nine ways to make your retail security system work harder

    Nine ways to make your retail security system work harder

    Financial institutions require future-ready physical security technologies

    Financial institutions require future-ready physical security technologies

    H.265 High Efficiency Coding: Video compression for security applications

    H.265 High Efficiency Coding: Video compression for security applications

    How to overcome the storage challenges of adopting surveillance AI

    How to overcome the storage challenges of adopting surveillance AI

About us Advertise
  • Artificial intelligence (AI)
  • Cyber security
  • ISC West
  • Counter Terror
  • Robotics
  • Body worn video cameras
  • Intrusion detection
  • Video management software
  • Trade Show/Exhibition
  • Video analytics
  • View all
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Cyber security

Crossword Cybersecurity’s Consulting division signs agreements to improve company’s cyber security posture

27 Nov 2019

Download PDF version
Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Related Links
  • How to reinforce your cybersecurity strategy
  • Artificial Intelligence: A new weapon in the cyber security arms race
  • How smart homes are impacting the security industry

Crossword Cybersecurity, is pleased to announce that its Consulting division has recently signed numerous agreements including three with companies spanning the automotive, insurance and property sectors, to work with them on improving their cyber security posture.

A cyber transformation project has begun with a global pioneer in connected vehicle data. Crossword Cybersecurity will assist the company with implementing a globally recognised cyber security standard, ranking it amongst major global players in the technology industry. Achieving this standard will enable the firm to work more efficiently with any global automotive manufacturer.

Prioritised cyber security strategy

Consulting has also secured business with an international insurance broker that conducts business in the Lloyd’s of London market. A third-party audit left the organisation with a long list of security measures to implement but lacking sufficient in-house expertise to do so.

Consulting division has implemented its Virtual Chief Information Security Officer (vCISO) product

Crossword Consulting worked with the organisation to offer advice on how best to improve their cyber maturity. Since developing the organisation’s prioritised cyber security strategy, Crossword will now also be carrying out the transformation work and implementing the practical recommendations they devised to make the organisation more resilient.

Virtual cyber security

The consulting division has implemented its Virtual Chief Information Security Officer (vCISO) product with an SME property investment firm. One of the key cyber security challenges organisations are currently facing, is understanding and implementing the most appropriate levels of cyber maturity for their company, and therefore allocating their cyber security budget efficiently.

In response to these challenges, Crossword launched vCISO - a virtual/remote CISO service, provided and managed by Crossword Consulting cyber security experts. The vCISO service provides clients with a virtual cyber security team and network protection at a fraction of the cost of building their own team and clients are also able to leverage the deep cyber security and technical expertise provided by Crossword and Reliance ACSN.

Multiple vCISO opportunities

They are taking the right measures to protect themselves from cyber security attacks"

Crossword’s Consulting team offers a full range of consulting services from Cyber Assurance and Auditing, Penetration testing, Third Party Assurance and Virtual Chief Information Security Officer (vCISO). Whatever an organisation’s size or level of cyber maturity, Crossword Consulting is able to offer a service tailored to its needs.

Regarding the recent deal announcements, Stuart Jubb, Managing Director of Crossword Consulting, commented: “We are delighted that Crossword Consulting is making such headway, especially in terms of breaking ground into new sectors and with large corporations. This reflects the high regard in which our consultants are held, in what is an extremely competitive market.

“It is a pleasure to announce our second vCISO client and note that there are multiple vCISO opportunities in our pipeline. We believe that by using our vCISO service, clients are able to have peace of mind that they are taking the right measures to protect themselves from cyber security attacks whilst achieving excellent value for money.”

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version
  • Network / IP
  • Network monitoring
  • Vehicle telematics
  • Vehicle security
  • Cyber security
  • Internet of Things (IoT)
  • Data Security
  • Related categories
  • Access control controllers
Featured white papers
Financial institutions require future-ready physical security technologies

Financial institutions require future-ready physical security technologies

Download
How to overcome the storage challenges of adopting surveillance AI

How to overcome the storage challenges of adopting surveillance AI

Download
Physical security supports a future-proof cyber security strategy

Physical security supports a future-proof cyber security strategy

Download
Related articles
MOBOTIX embraces open system approach and cybersecurity in the Americas

MOBOTIX embraces open system approach and cybersecurity in the Americas

How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Follow us

Sections Products Companies News Insights Case studies Markets Events White papers Videos November 2019 news RSS
Topics Artificial intelligence (AI) Cyber security ISC West Counter Terror Robotics Body worn video cameras Intrusion detection Video management software Trade Show/Exhibition
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2019, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACInformed.com

Subscribe to our Newsletter


SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download SourceSecurity.com product tech spec