TPN & ISO 27001
PREPARATION & ENGINEERING
Pre-Assessment preparation and engineering to ensure your facility meets or exceeds MPA Content Security Best Practices or your organisation meets or exceeds ISO/IEC 27001 standards prior to commencing an Assessment
POST TPN & ISO27001 ASSESSMENT
REMEDIATION & ENGINEERING
We work with you to rectify any shortcomings observed in your cybersecurity posture as a result of your
TPN Assessment or ISO/IEC 27001 Assessment.
REMOTE & ONSITE
TPN & ISO27001 ASSESSMENT
Onsite and remote TPN Assessment and ISO/IEC 27001:2013 where we audit your facility or crganisation with one of our Accredited TPN Assessors or ISO27001 Assessors.
GOVERNANCE & CYBERSECURITY
We work with you to develop Governance Policies and Procedures that are required to be developed and delivered as part of the TPN or ISO/IEC 27001 Assessment process.
Trusted Partner Network
The Trusted Partner Network is a global film and television content protection initiative established as a joint venture between the MPA and CDSA. We offer TPN auditing and consulting services, including Pre-Assessment Preparation, Pre-Assessment Engineering
Onsite Assessment, Remote Assessment, Post-Assessment Remediation, Post-Assessment Engineering. We can also assist you in implementing the MPA Content Security Best Practices based on your facility type and content handling methods.
Cyber Architecture & Engineering
We are continually on the lookout for the newest technologies and best-of-breed tools in order to architect and build secure networks and systems. We can architect and design solutions to meet your needs incorporating solutions to cover CIS-20, ASD's Essential Eight and OWASP Top 10: Network Inventory, Asset Discovery, Application White-listing, Continuous Vulnerability Assessment & Remediation, EndPoint Protection, Backup and DR, Centralised Logging & SIEM, Secure WiFi, Secure VPN + 2FA, Mobile Device Management, Secure Programming
Surveillance & Access Control
We can help you design and build a physical security programme along with corresponding access policies, including:
Security Teams, Security Patrols, Back to Base Alarm Systems, Environmental Sensors, Closed Circuit TV, Mechanical Access Controls, Electrical Access Controls Identification Systems, Visitor Registration Systems, Biometric Recognition, Number Plate Recognition, UAV Surveillance