Control Risks Group Experience Risk Security
Firm providing UK-based security consulting.Control Risks is an independent global risk consultancy specialising in helping organisations manage political integrity and security risks in complex and hostile environments​
Feel free to add your comment or post!
Business Hours
Opening hours for Control Risks Group ($) *Reviews
Control Risks Group
Control Risks Group Review ›
crg.com/
Statistic generated on
2024-04-23
SiteBook.org Points
(According to Visits for this Profile)
(According to Visits for this Profile)
Address
Website | crg.com/ |
Name | Control Risks Group |
Street | |
ZIP Code | |
City | |
Region | |
State | |
Phone No. |
Risk Security Political Services Integrity Risks Sign Networks Social Events Consulting Training Management Blog Independent Whitepaper Security Consultants General And Freelance Europe United Kingdom Integrity Risk Security Risk Political Risk
Reviews and Comments for Control Risks Group
Feel free to add your comment or review!Best entries for Risk and Security
1 Introduction to Security Risk Analysis & Security Risk Assessment
Introduction to
Introduction to the theory behind most recognized risk assessment and security risk analysis methodologies.
Risk Security Cobra Analysis Assessment Introduction Other Itil Software Disaster Policies ** Management Process Products
Introduction to the theory behind most recognized risk assessment and security risk analysis methodologies.
Risk Security Cobra Analysis Assessment Introduction Other Itil Software Disaster Policies ** Management Process Products
2 Citicus ONE - security risk management
Citicus provides
Citicus provides tools for information risk management to ensure that compliance with security policy can be monitored and enhanced.
Citicus Risk Moca Software Management Supplier Information Technology Contact News Support Services Partners Customers Customer
Citicus provides tools for information risk management to ensure that compliance with security policy can be monitored and enhanced.
Citicus Risk Moca Software Management Supplier Information Technology Contact News Support Services Partners Customers Customer
3 TruSecure Corporation
Risk mitigation
Risk mitigation for complex and interconnected business environments. Provider of managed security, risk reduction, and software solutions to prevent network intrusion.
Security Verizon Services Compliance Vulnerability Enterprise Business Solutions Products Risk Identity Management Cloud Managed Wireless Industries Data Networking Legal
Risk mitigation for complex and interconnected business environments. Provider of managed security, risk reduction, and software solutions to prevent network intrusion.
Security Verizon Services Compliance Vulnerability Enterprise Business Solutions Products Risk Identity Management Cloud Managed Wireless Industries Data Networking Legal
4 Ultima Risk Management
Providers of
Providers of information security and risk management consultancy and certification training. Located in the United Kingdom.
Urm Iso Security Case Ultima Risk Management News Policy Data Study Contact Studies Certification Information Help Bcms
Providers of information security and risk management consultancy and certification training. Located in the United Kingdom.
Urm Iso Security Case Ultima Risk Management News Policy Data Study Contact Studies Certification Information Help Bcms
5 Strange Research Corp.
Security advisory
Security advisory firm specializing in security risk assessment,network and application penetration testing, and security architecture services.
Domain Hosting Gandi Simple Registrar Name Más Paas Information Cloud Mail De Nombre Ssl Rechercher Forwarding
Security advisory firm specializing in security risk assessment,network and application penetration testing, and security architecture services.
Domain Hosting Gandi Simple Registrar Name Más Paas Information Cloud Mail De Nombre Ssl Rechercher Forwarding
6 mi2g Limited
Digital risk
Digital risk consultants specialising in providing secure data visualisation. Also provide SIPS security intelligence briefings on hacker activity and various risk analysis tools. London, UK.
Security Banking Management Intelligence Mig Digital Bespoke Information Risk Tools Systems Methodology Architecture Subscribe Profile Engineering
Digital risk consultants specialising in providing secure data visualisation. Also provide SIPS security intelligence briefings on hacker activity and various risk analysis tools. London, UK.
Security Banking Management Intelligence Mig Digital Bespoke Information Risk Tools Systems Methodology Architecture Subscribe Profile Engineering
7 Information Risk Group LLC
Offering risk
Offering risk management services, specializing in security assessments, ethical hacking, incident response and computer forensics, electronic discovery, and professional training for companies throughout the Americas.
Joomla Group Risk Security Templates Joomlashinecom Epic Matters Compliance Hipaa Contact Assessments Glba Source Response United Thanks Us Since Consultantcy
Offering risk management services, specializing in security assessments, ethical hacking, incident response and computer forensics, electronic discovery, and professional training for companies throughout the Americas.
Joomla Group Risk Security Templates Joomlashinecom Epic Matters Compliance Hipaa Contact Assessments Glba Source Response United Thanks Us Since Consultantcy
8 Enterprise Risk Management
A professional
A professional services firm offering services from risk assessment to the remediation of existing security problems, as well as the design and implementation of secure information technology frameworks.
Security Compliance Services Risk Assessment Information Management – Act Audit Implementation Enterprise Computer Network Threat Industrial Iso Investigation
A professional services firm offering services from risk assessment to the remediation of existing security problems, as well as the design and implementation of secure information technology frameworks.
Security Compliance Services Risk Assessment Information Management – Act Audit Implementation Enterprise Computer Network Threat Industrial Iso Investigation
9 Nemesys Computer Consultants Ltd
Based in
Based in Cambridge, UK specialising in security policy development, risk analysis, information security reviews, security-critical software development and computer security incident handling.
Navigationshilfe Ty
Based in Cambridge, UK specialising in security policy development, risk analysis, information security reviews, security-critical software development and computer security incident handling.
Navigationshilfe Ty
10 Security Evolution
Provider of
Provider of risk assessments, compliance audits, security architecture revies, training and part-time Chief Security Officers in addition to technology implementation, integration, and follow-up support.
Security Resume Upload Page Services Network Google Sites Secev Administration Information Identify Virtual Nist Auditing Home * Y
Provider of risk assessments, compliance audits, security architecture revies, training and part-time Chief Security Officers in addition to technology implementation, integration, and follow-up support.
Security Resume Upload Page Services Network Google Sites Secev Administration Information Identify Virtual Nist Auditing Home * Y
11 Backbone Security
Provides managed
Provides managed security services, risk asssessments and continuity planning.
Security Backbone Steganography Services News Managed Sarc Compliance Threat Assessment Contact Vendor Complimentary Conference Database Digital Registrations
Provides managed security services, risk asssessments and continuity planning.
Security Backbone Steganography Services News Managed Sarc Compliance Threat Assessment Contact Vendor Complimentary Conference Database Digital Registrations
12 Cygnus Security Corporation
Provider of
Provider of IT security support and risk assessment located in Sheepshead.
Z Y
Provider of IT security support and risk assessment located in Sheepshead.
Z Y
13 Cygnus Security Corporation
Provider of
Provider of IT security support and risk assessment located in Sheepshead.
Z Y
Provider of IT security support and risk assessment located in Sheepshead.
Z Y
14 Securiant, Inc.
Provides 'Spider'
Provides 'Spider' integrated network security appliance with over 10 security functions in one platform including IDS/IPS, a vulnerability scanner, risk analysis, Web content filter, SPAM and virus filter, Wireless security, firewall and VPN.
Toilet Wc Toiletten Sanitair Verhuur Toiletpot Werf Minimum Handboek Securiant Wikipedia Nederlands Voor Woorden Unit Wagens
Provides 'Spider' integrated network security appliance with over 10 security functions in one platform including IDS/IPS, a vulnerability scanner, risk analysis, Web content filter, SPAM and virus filter, Wireless security, firewall and VPN.
Toilet Wc Toiletten Sanitair Verhuur Toiletpot Werf Minimum Handboek Securiant Wikipedia Nederlands Voor Woorden Unit Wagens
15 Risk Fighter
Risk Fighter
Risk Fighter is based on Cause/Effect principles. Find what causes the risk - remove the cause - now the risk is gone.
Z Y
Risk Fighter is based on Cause/Effect principles. Find what causes the risk - remove the cause - now the risk is gone.
Z Y
16 Redspin, Inc.
Specializes in
Specializes in security, compliance and risk management including penetration tests, IT audits and security assessments.
Security Testing Redspin Assessment Risk Penetration Analysis Hipaa Healthcare Resources Mobile Audit Learn Application Data Tools Blog
Specializes in security, compliance and risk management including penetration tests, IT audits and security assessments.
Security Testing Redspin Assessment Risk Penetration Analysis Hipaa Healthcare Resources Mobile Audit Learn Application Data Tools Blog
17 Cygnus Security Corporation
Provider of
Provider of IT support services including security and customized risk assessment solutions and compliance consulting.
Z Y
Provider of IT support services including security and customized risk assessment solutions and compliance consulting.
Z Y
18 Cygnus Security Corporation
Provider of
Provider of IT support services including security and customized risk assessment solutions and compliance consulting.
Z Y
Provider of IT support services including security and customized risk assessment solutions and compliance consulting.
Z Y
19 Exceed Security Systems LLC - Information Security Services
Provides services
Provides services for reducing and mitigating risk with security consulting services and products. Offers custom IDS with continuously monitored, secure and managed hosting for client data.
Directory Listing Errordirectoryvirtualdenied Deniedthis
Provides services for reducing and mitigating risk with security consulting services and products. Offers custom IDS with continuously monitored, secure and managed hosting for client data.
Directory Listing Errordirectoryvirtualdenied Deniedthis
20 Maxama
Specialising in
Specialising in information technology risk assessment and security evaluation, business continuity planning, and the provision of IT security and training services.
Navigationshilfe Ty
Specialising in information technology risk assessment and security evaluation, business continuity planning, and the provision of IT security and training services.
Navigationshilfe Ty
21 Global Security Technologies, Inc.
Provider of
Provider of e-commerce enablement, infrastructure security systems, secure remote access, risk management and architectural integration services.
Security Inc User Technologies Global Solutions Login Changs Confirms Contact Services Heartbleed Pf Under Privacy
Provider of e-commerce enablement, infrastructure security systems, secure remote access, risk management and architectural integration services.
Security Inc User Technologies Global Solutions Login Changs Confirms Contact Services Heartbleed Pf Under Privacy
22 Mad as hell, switching to Mac
An experiment
An experiment predicated on the hypothesis that the WinTel platform represents the greatest violation of the basic tenets of information security and has become a national economic security risk.
Security Cloud Network Management Idg World Subnet Tech Windows Microsoft Close Lan News Wan Linkedin Cisco Operating Software Clueless Cso
An experiment predicated on the hypothesis that the WinTel platform represents the greatest violation of the basic tenets of information security and has become a national economic security risk.
Security Cloud Network Management Idg World Subnet Tech Windows Microsoft Close Lan News Wan Linkedin Cisco Operating Software Clueless Cso
23 VantagePoint Security
Professional services
Professional services firm specializing in security policy, assessments, risk mitigation, and managed services.
Professional services firm specializing in security policy, assessments, risk mitigation, and managed services.
24 Strategic Thought Group
Active Risk
Active Risk Manager: Web based enterprise risk management system. Provides advanced support for project, operational and corporate risk management
Risk Management Active Project Enterprise Resources Manager Business Arm Professionals Industries Product Press Energy Why
Active Risk Manager: Web based enterprise risk management system. Provides advanced support for project, operational and corporate risk management
Risk Management Active Project Enterprise Resources Manager Business Arm Professionals Industries Product Press Energy Why
25 SecurityProNews
Advice on
Advice on how to identify the best type of intrusion detection system for a particular environment, develop organizational guidelines for passwords, set general computer security policies, and perform a security review and risk assessment.
Share Linkedin Google+ Security Internet Securitypronews Explorer Apple Email Chrome Malware Policy Google Heartbleed Yahoo
Advice on how to identify the best type of intrusion detection system for a particular environment, develop organizational guidelines for passwords, set general computer security policies, and perform a security review and risk assessment.
Share Linkedin Google+ Security Internet Securitypronews Explorer Apple Email Chrome Malware Policy Google Heartbleed Yahoo
26 Pirean Limited Homepage
Providing enterprise
Providing enterprise systems, risk management and information security services, applications and education with a focus on security management and international standards (BS7799 / ISO17799).
Pirean Access Consulting Partners Idaas Download Contact Privacy Cloud News Values Conditions Careers User Leaders Employees
Providing enterprise systems, risk management and information security services, applications and education with a focus on security management and international standards (BS7799 / ISO17799).
Pirean Access Consulting Partners Idaas Download Contact Privacy Cloud News Values Conditions Careers User Leaders Employees
27 Silk Road
IP network
IP network management, scalable network design, security systems engineering, and network security risk assessments.
Talent Solutions Portal Customer Software Hr Hrms Onboarding Recruiting Redcarpet Greenlight Support Openhire Wingspan Performance Heartbeat
IP network management, scalable network design, security systems engineering, and network security risk assessments.
Talent Solutions Portal Customer Software Hr Hrms Onboarding Recruiting Redcarpet Greenlight Support Openhire Wingspan Performance Heartbeat
28 DeVore Networks
Provides a
Provides a range of internet related consultancy services including voice over IP, network design and support, risk management and security. Lists services and jobs offered. Offering a free security questionnaire.
Services Support Consulting Computing Cloud Devore Backup Disaster Recovery Seattle Contact Healthcare High Speed Financial Voip Legal
Provides a range of internet related consultancy services including voice over IP, network design and support, risk management and security. Lists services and jobs offered. Offering a free security questionnaire.
Services Support Consulting Computing Cloud Devore Backup Disaster Recovery Seattle Contact Healthcare High Speed Financial Voip Legal
29 Pertmaster Project Risk
Quantitative risk
Quantitative risk analysis software using Monte-Carlo simulation. Can be used to build standalone risk models or as a add-on to Microsoft Project and Primavera software.
Z Y
Quantitative risk analysis software using Monte-Carlo simulation. Can be used to build standalone risk models or as a add-on to Microsoft Project and Primavera software.
Z Y
30 AgenaRisk
Software and
Software and consulting in Bayesian networks, simulation and risk analysis. Causal modeling, data analysis and statistical modeling for AI, financial risk, six-sigma and project risk applications.
Agenarisk Bayesian Support Risk Fenton Network Download Agena Analysis Contact Case Company Management Technology Readings Studies References Desktop Hatton Logo
Software and consulting in Bayesian networks, simulation and risk analysis. Causal modeling, data analysis and statistical modeling for AI, financial risk, six-sigma and project risk applications.
Agenarisk Bayesian Support Risk Fenton Network Download Agena Analysis Contact Case Company Management Technology Readings Studies References Desktop Hatton Logo
31 Lostar Security Services
Consultancy and
Consultancy and services company located in Istanbul, Turkey. Offers risk analysis, security policy, e-policy, implementation, training and auditing.
DanıÅŸmanlıÄŸı SürekliliÄŸi Bilgi GüvenliÄŸi Yönetim Sistemi Lostar Security Denetimi Hizmetlerimiz YönetiÅŸimi Checkup Analizi Kriz Ä°ÅŸ Lostarakademi Awareness
Consultancy and services company located in Istanbul, Turkey. Offers risk analysis, security policy, e-policy, implementation, training and auditing.
DanıÅŸmanlıÄŸı SürekliliÄŸi Bilgi GüvenliÄŸi Yönetim Sistemi Lostar Security Denetimi Hizmetlerimiz YönetiÅŸimi Checkup Analizi Kriz Ä°ÅŸ Lostarakademi Awareness
32 Blue River Systems
Provides security
Provides security services and risk assessment audits.
Z Wwwblueriversyscom Y
Provides security services and risk assessment audits.
Z Wwwblueriversyscom Y