info@urmconsulting.com
0118 206 5410
Consultancy and Services
Information Security
ISO 27001
What is ISO 27001?
Gap Analysis
Risk Assessment
Implementation
Consultancy Services
PCI DSS
What is PCI DSS?
Penetration Testing
Scope Reduction
Gap Analysis
Implementation
Assessment and Auditing
Consultancy Services
SOC 2
What is SOC 2?
Gap Analysis
Remediation
Audit and Assessment
Training
Consultancy Services
CMMC
What is CMMC?
Gap Analysis
Implementation
Assessment
Consultancy Services
GC RTS
What is GC RTS?
Gap Analysis
Implementation
Assessment
Consultancy Services
SWIFT CSP
What is SWIFT CSP?
Gap Analysis
Implementation
Assessment and Auditing
Consultancy Services
NIST CSF
What is NIST CSF?
Implementation
Consultancy Services
Information Security Consultancy Services
URM provides consultancy services on:
ISO 27001
PCI DSS
SOC 2
CMMC
GC RTS
SWIFT CSP
NIST CSF
Cyber Security
penetration testing
Penetration Testing
What is Pen Testing?
Network and Infrastructure
Web Application
Cloud
Mobile Application
Business-led
Services
Cyber Essentials
Cyber Essentials
What is Cyber Essentials?
Assessment
Gap Analysis
Application Review
Cyber Essentials Plus
Cyber Advisor
Certified by URM
Consultancy Services
Register now
cyber security
Vulnerability Scanning
What is Vulnerability Scanning?
ASV Scanning
Services
Social Engineering
What is Social Engineering?
Penetration Testing
Services
Incident Response
What is Incident Response?
Cyber Incident Exercise
Services
Cyber Security Services
URM provides services on:
Penetration Testing
Cyber Essentials
Vulnerability Scanning
Social Engineering
Incident Response
Data Protection
Data Protection
A set of practices, laws, and policies designed to safeguard personal data from unauthorised access, misuse, disclosure, destruction, or loss.
GDPR
A comprehensive data protection law designed to protect personal data and privacy rights in the EU and the UK.
Gap Analysis
Helps identify the "gaps" or areas where the organisation is not meeting GDPR standards.
DPIA
A vital process that helps organisations systematically identify and address privacy risks in their data processing activities.
ROPA
A fundamental requirement that helps organisations maintain transparency, accountability, and compliance in their data processing activities.
Virtual DPO
An effective solution for organisations seeking to comply with GDPR requirements without the need for a full-time, in-house Data Protection Officer.
DSAR
A mechanism that allows individuals to request access to the personal data that an organisation holds about them.
Awareness Training
A critical component of an organisation's data protection strategy.
Data Protection Consultancy and Services
URM provides consultancy and services on:
GDPR
GDPR Gap Analysis
Virtual DPO
DPIA
ROPA
DSAR
GDPR Training and Awareness
Business Continuity
Business Continuity
Processes and procedures an organisation implements to ensure that essential functions can continue during and after a disaster or disruption.
ISO 22301
An international standard for Business Continuity Management Systems (BCMS). It provides a framework and guidelines for organisations to prepare for, respond to, and recover from disruptive incidents.
ISO 22301 Gap Analysis
Evaluates an organisation's business continuity management practices against the requirements of the ISO 22301 standard.
ISO 22301 Implementation
The process of establishing, operating, monitoring, reviewing, and continually improving a BCMS in accordance with the ISO 22301 standard
Business Impact Analysis
A systematic process used to identify and evaluate the potential effects of disruptions to critical business operations.
Business Continuity Plan
A comprehensive document that outlines the procedures and actions to ensure that critical business functions can continue during and after a disruptive incident.
Exercising
Testing and validating BC plans through various types of drills and exercises.
Business Continuity Consultancy and Services
URM provides consultancy and services on:
ISO 22301
ISO 22301 Gap Analysis
ISO 22301 Implementation
Business Impact Analysis
Business Continuity Plans
Exercising BCPs and IMPs
Internal Audit
Internal Audit
An independent, objective assurance and consulting activity designed to add value and improve an organisation's operations. It helps an organisation accomplish its objectives by bringing a systematic, disciplined approach to evaluate and improve the effectiveness of risk management, control, and governance processes.
Outsourced Service
The practice where an organisation hires an external service provider to perform internal audit activities instead of using its in-house audit team.
Audit Schedules
Planned timetable and sequence of audit activities to be conducted over a specific period, usually a year.
Third Party Audit
An independent evaluation conducted by an external organisation or auditor that is not affiliated with the company being audited.
Internal Audit Consultancy and Services
URM provides consultancy and services on:
Internal Audit
Audit Schedules
Third Party Audit
Other Standards
ISO Standards
ISO standards are a set of internationally recognised guidelines and specifications developed and published by the International Organisation for Standardisation (ISO). These standards aim to ensure the quality, safety, efficiency, and interoperability of products, services, and systems across various industries.
ISO 42001
Standard is designed to ensure that AI technologies are developed, deployed, and maintained in a responsible, transparent, and ethical manner. It addresses various challenges associated with AI, including risk management, ethical considerations, transparency, and continuous learning.
ISO 9001
Standard for quality management systems (QMS). It is part of the ISO 9000 family of standards and provides a framework for organisations to ensure they meet the needs and expectations of their customers and other stakeholders.
Other Standards Consultancy and Services
URM provides consultancy and services on:
ISO 42001
ISO 9001
Products
Abriska 27001
Information Security Risk Management Software
Abriska 19011
Audit and Action Management Software
Abriska 27036
Supplier Risk Management Software
Abriska 22301
Business Continuity Management Software
Abriska 31000
Enterprise Risk Management Software
Alurna
Online Awareness Training Tool
Training
Information Security
CISMP
The course provides the information how to manage information and cyber security and address the ever-evolving threats and changes.
Introduction to ISO 27001
One-day Course provides essential guidance on how organisations can most effectively improve their information security.
Migration to ISO 27001
The course is aimed at anyone who needs to understand the changes that have been made to ISO 27002 and which will be made to Annex A of ISO 27001, and how to implement the new controls.
Transition to ISO 27001
The course addresses the management system clauses, controls and focuses on transitioning to ISO 27001:2022.
Data Protection and GDPR
CDP
The course provides a sound grounding and practical interpretation of the key elements of UK data protection law, including the UK GDPR
DPIA
The course addresses all aspects of performing a DPIA and provides you with confidence in your approach.
DSAR
The course provides clear and practical instruction and guidance on dealing with all aspects of a data subject access request (DSAR).
DTIA
The course is designed to help you understand how to accomplish a successful and thorough TRA/DTIA
risk Management
PCIRM
All you need to know about the information risk management, conducting risk assessments and developing risk treatment plans.
other standards
Introduction to ISO 42001
One-day Course provides essential guidance to organisations embarking on an Artificial Intelligence (AI) journey.
Training Schedule
See upcoming courses
Resources
White Papers
URM provides an in-depth exploration of a specific issues and problems related to information and cyber security.
Data Sheets
URM provides a concise and specific technical information about products and service.
Case Studies
URM shares detailed examinations of specific subjects to explore causation, provide insights, and illustrate theories within real-world contexts.
FAQs
Information Security FAQ
ISO 27001 FAQ
ISO 27001 Internal Auditing FAQ
PCI DSS FAQ
Business Continuity FAQ
Data Protectio FAQ
GDPR FAQ
Cyber Essentials FAQ
Penetration Testing FAQ
Blogs
Events
About Us
About URM
Overview
URM Core Values
Brief History
Certifications
Testimonials
Consultancy
Cyber
Products
Training
Partners
Our Partners
Become Partner
Contact us
Contact Us
Page Not found
The page you are looking for doesn't exist or has been moved
Why not use our search engine instead?