Cyber Security & IT Compliance
Central Cyber Security (CCS) clients perform business in cyberspace. We deliver a practical, comprehensive, and efficient approach to cybersecurity risk management that keeps pace with today’s dynamic risk landscape. Extend the security of your business by enabling extensive visibility, increased compliance, rapid response and the ability to manage threats. Our Cybersecurity consultants help assess security programs, enterprise risk posture and enterprise risk strategy planning and development for our clients. We are focused on identifying and managing risk to protect and create value for our clients.Cybersecurity Services
- Cyber Crime Litigation before Adjudicating Officer, Cyber Appellate Tribunal and High Court (Appeal matters).
- Information Technology Law compliance Advice and GAP Analysis
- Cybersquatting issues in Cyberspace
- Linking issues in Cyberspace
- Cryptocurrency & Blockchain Laws
- GDPR Legal Compliance
- Intermediary Guidelines Compliance
- Trademark issues and Domain name disputes in cyberspace
- Copyright issues of digital content and software
- Intellectual Property Rights Enforcement by litigation and Raids to forfeit infringing material.
- Reasonable Security Practices Compliance
- E-Commerce Compliance with respect to Section 43A of Information Technology Act.
- Legal Advice with respect to Taxation and legality of Business Strategy in cyberspace.
- Online Gaming Laws
- Online Pornography Laws
- Internet of Things (IoT) legal compliance
- Privacy Law Compliance
- Drafting of Terms and Conditions, Privacy Policy, Disclaimer, Vendor Agreements, Technology Transfer Agreements, Data Transfer Agreements and Intellectual Property Rights Assignment Agreements.
- Information Security Policies and Procedures
- Business Continuity Management
- Standards - ISO 27001, BS 25999, ISO 20000
- Application Security Assessments
- Forensics & Incident Response
Information Security Tools
- SIEM: LogRhythm, ArcSight, QRadar, McAfee SIEM and AlienVault
- Vulnerability Management: Nexpose, Nessus, and Qualys
- Firewalls: ASA, Checkpoint, and Juniper
- IDS/IPS: Sourcefire, McAfee IPS, and Trend Micro Tipping point
- WebApp Firewalls: Imperva, F5, Akamai, Barracuda, Fortinet, Citrix, and Layer7 API gateway.
- Threat Intelligence and Management: RiskIQ, Skybox, Anomali, Webroot, and CrowdStrike.