High Performance Computing Storage
Perimeter Security, Vulnerability and Incident Management, Identity and Access Management, Enterprise Risk Management, Open Source and Secure Email ICT Security Strategy and Implementation.
Application Security, Training, CRYPTOGRAPHIC VPN (450 node)
Information Security Systems Management and ICT Security Policies and ISO 27001
Business Continuity Management and Disaster Recovery plan
ICT Security Policies and ISO 17799
ICT Security Assessments / Policies