
Configuration review of identity, network, endpoint, cloud, and data tiers. Mapped to a recognised framework. Output: gap register with severity and effort estimates.
External, internal, web application, wireless, social engineering. Black-box, grey-box, or white-box, your choice. CREST-aligned methodology.
Mapped to ISO 27001, GDPR, NIST CSF, PCI DSS, or HIPAA. Current-state assessment, gap register, and a target-state roadmap with effort and budget.
Automated scanning, risk prioritization, patch coordination, monthly remediation reports. Continuous after the initial audit, optional ongoing service.
Retrospective review of historical telemetry to find dwell-time threats. Live incident response engagements available; we have run several USA breaches.
Information security policy, acceptable use, incident response, business continuity. Written for your business, not boilerplate. Ready for audit and board sign-off.
Information Security Management System against the Annex A control set. We have taken USA clients through full certification, not just gap-analysis theatre.
USA Information Assurance Standards (T1-T5). Mandatory for critical-sector entities, expected by federal regulators, and increasingly referenced in private-sector tenders.
EU General Data Protection Regulation for USA businesses with EU customers, EU staff, or EU-residency data. The compliance bar is the same, the enforcement is real.
Payment Card Industry Data Security Standard for any business that processes, stores, or transmits cardholder data. Levels 1-4, scoped to your annual transaction volume.
Health Insurance Portability and Accountability Act mapping for international healthcare groups operating in the United States. Privacy and Security Rule controls plus Breach Notification.
Service Organisation Controls Type 1 and Type 2 readiness for SaaS and tech companies selling into enterprise customers. Trust Services Criteria across security, availability, confidentiality.
ISO 27001, GDPR, NIST CSF, PCI DSS, HIPAA. We have taken clients through full certification, not just compliance theatre.
We do not resell a security stack we are trying to push. Findings name the gap, not the product. You buy what you need, not what is in our catalogue.
Executive summary, technical detail, remediation roadmap, budget. Two-tier deliverable: 5-page board pack and full evidence appendix.
Engineers hold CISSP, CEH, CISM, ISO 27001 LA. The team that runs your engagement is named in the SOW, not a junior subcontractor.
Define audit scope, objectives, and methodology. Rules of engagement signed before any work starts.
Collect documentation, interview stakeholders, and understand the current control environment.
Conduct security testing, vulnerability scanning, and control evaluation against the framework.
Analyse findings, prioritise risk, and prepare the executive and technical reports.
Support implementation of fixes, re-test remediated findings, hand off into continuous monitoring.
SEC, NYDFS Part 500, regulated lenders, insurance brokers. ISO 27001, PCI DSS where cardholder data is in scope, regulator-specific frameworks.
HIPAA-regulated healthcare facilities (hospitals, clinics, dental practices). PHI handling, patient-data DLP, HIPAA mapping for international groups, NIST CSF where applicable.
Card-present, card-not-present, multi-channel. PCI DSS scoping (level 1-4), tokenization advice, segmentation review, ASV scanning.
Law firms, accountancies, consultancies. Confidentiality controls, document management security, M&A diligence support, GDPR for international clients.
Schools, universities, training providers. Student-data protection, exam system integrity, parental consent, vendor management for ed-tech.
Logistics, utilities, large hospitality. NIST CSF framework alignment, OT/IT segmentation, business continuity, incident response readiness.
| Feature | In-house attestation Your IT team | Independent audit External, evidenced |
|---|---|---|
Conflict of interest Auditing your own team's work creates incentive to soften findings. | Yes (structural) | No |
Acceptable for ISO 27001 audit | ||
Acceptable for board sign-off | Limited | Yes |
Penetration testing depth You cannot pen-test what you built. | Self-blind spots | Independent perspective |
Framework certification readiness | ||
Regulatory submissions | Often rejected | Accepted |
Cost | Internal time only | From USD 25,000 per engagement |
Access control review, policy compliance, internal network assessment, user activity monitoring.
External vulnerability scan, web app testing, DNS security review, email security assessment.
Source code review, OWASP Top 10 testing, API security testing, authentication testing.
Cloud configuration review, IAM policy assessment, data storage security, cloud service security.
PCI DSS, ISO 27001, local banking regulations. Protect financial data and meet strict regulator requirements.
HIPAA, patient-data protection, medical-device security. Secure patient records and meet healthcare compliance.
NIST CSF framework, national security standards. Meet government security expectations and protect citizen data.
PCI DSS, customer data protection, GDPR. Secure payment processing and customer information.
Student-data protection, FERPA mapping for international groups. Protect student records and exam systems.
SOC 2, ISO 27001, product security. Demonstrate security to enterprise customers and partners.
Critical and high findings closed within the 90-day remediation window.
ISO 27001, GDPR, NIST CSF, PCI DSS, HIPAA, SOC 2 covered end-to-end.
Active compromise or exposed data flagged within hours, not at report delivery.
CISSP, CEH, CISM, ISO 27001 LA on every named engagement team.
90/180/365 day roadmap with effort estimates and budget guidance.
Post-certification surveillance and continuous control attestation.
1 week
Discovery call, scope document, NDA, SOW, signed engagement letter. Rules of engagement defined for testing. No work starts until both sides have signed.
2-4 weeks
On-site and remote testing per the methodology. Evidence captured, configurations reviewed, controls tested. Daily standups during pen tests; weekly during audits.
1-2 weeks
Executive summary, technical findings, evidence appendix, remediation roadmap. Internal QA before delivery. Live read-out session with stakeholders.
Within 60 days
You remediate. We re-test the fixes. Findings closed in writing. Open items go to the next quarterly review or stay in your risk register with target dates.
“We engaged GR IT for an ISO 27001 readiness audit and a penetration test. The findings were honest enough to be uncomfortable and useful enough to give us a clear 9-month roadmap. We certified on the first attempt and the auditor specifically called out the quality of the gap remediation evidence.”
Continuous baseline security as part of an Annual Maintenance Contract: endpoint protection, patch management, MFA enforcement, threat detection.
Learn moreFull operational ownership including security operations: 24/7 monitoring, EDR, quarterly penetration testing, vCIO security advisory.
Learn moreTell us your sector, framework target, and current posture. We scope the engagement and propose a fixed-fee, fixed-timeline programme.
Learn moreThree-minute form. Our security team gets back the same business day to schedule a 30-minute scoping call. No obligation, no auto-billed retainer.