top of page
Modern Architecture

Our services offer skilled capacity to your business:

  • IT Operational and Security Risk Management

  • Virtual CISO services

  • Crisis Management Excercises

  • Supplier Security Reviews

IT Operational and Security Risk Management

Is Information Security important to you? Would you like to better understand these risks and how to address them?
We have a holistic approach to help you continuously identify and close IT and Information Security Control gaps.

What we Do for you

Lacuna Securities can be your one-stop-shop to guide, assess, control, test, mitigate and report on your operational IT and Security Risks. We have expert resources with many years of experience in their specialised fields that, together, provide a holistic approach to fulfil your requirements.

We focus on helping companies implement and maintain practical controls to manage their operational and security risks. This includes:


  • The Information Security and IT Risk Implementation Project
    Helping your business implement a practical Information Security Risk management methodology, identify, assess, quantify, control and report on these risks

  • The Information Security and IT Risk Monitoring
    Consulting and Technical services that help you maintain and monitor Information Security Risk Management. Also a periodic, ‘dip-in’ service that to continuously review and improve control gaps and methods to overcome these

  • The Information Security and IT Risk Audit Reviews
    An independent Information Security Audit Review to help you with you level of confidence and assurance of implemented Information Risk processes and controls

Virtual CISO (Certified Information Security Officer)

Our Virtual CISO service ensures businesses have access to the right security skills and capabilities, at the right time, through an on-demand model.

Benefits To Your Business

  • Lower cost as you pay for the support required rather than a fulltime employee

  • Ability to address market demand as you can access the capabilities quickly, reducing time and cost of attracting and retaining scarce talent

  • Improved maturity with a breadth of experience that deliver effective improvements to your security posture

  • Use of existing capability whereby current investment in expertise and technology is leveraged to enhance security.

bottom of page