Your challenges

  • Define risk management framework
  • Execute risk cycle based on your threat landscape 
  • Manage third party risks

Our answers to your needs

  • Implement, execute and monitor information security risk management process
  • Designed and implement Third party Risk Management (TPRM) program 
Sabika Ishaq
CISO - Head of Information Security
Sabika Ishaq