Romain TordoRomain Tordo

Cybersecurity audits

Assessment of how well your technical and procedural controls match the threats and failure modes you actually face. Audits here are input to prioritised roadmaps and architecture decisions—not a certificate hunt.

Context

  • Regulators, customers, and boards expect defensible narratives: what is protected, how you know, and how fast you can recover.
  • National-scale or sector-critical systems need scenarios that reflect systemic dependencies, not single-org playbooks.
  • Cloud and hybrid estates blur ownership between internal teams, MSPs, and SaaS vendors; boundaries must be explicit.

Problems addressed

  • Tooling sprawl without a coherent logging, detection, and response pipeline.
  • Identity models that do not scale with contractors, partners, and break-glass requirements.
  • Backup and recovery that pass backup jobs but fail realistic restoration under pressure.
  • Segmentation gaps that turn a desktop compromise into domain-wide impact.

What this work involves

  • Control mapping from asset inventory and data flows—starting from crown-jewel services, not spreadsheet completeness.
  • Review of identity lifecycle: provisioning, MFA coverage, privileged roles, service accounts, and key material handling.
  • Infrastructure hardening patterns: patching cadence, baseline images, network zones, and east-west monitoring assumptions.
  • Tabletop and architecture-informed scenarios to stress incident response, crisis comms, and cross-party coordination.
  • Prioritised remediation backlog with effort and dependency ordering for security and platform teams.

Relationship to services

Capability pages describe what kind of technical work sits behind advisory, security, and delivery engagements. Commercial framing, pricing, and engagement shape live under Services.