Cybersecurity services for South African organisations GTSP
📞 0722917579
✉️ info@gtsp.co.za
← Back to Home

About GTSP/h1>
A South Af
How we work

How engagements work

GTSP engagements are structured to be safe, measurable and executive‑ready. You get clear scope, agreed rules of engagement, evidence-driven findings and a remediation plan you can action immediately.

1) Scoping

  • Confirm target type (web / API / internal / AD / OT / AI), environments, and constraints.
  • Define rules of engagement: time windows, safety limits, contact points and escalation.
  • Agree deliverables: executive summary, technical annex, evidence packs, and optional retest.

2) Execution

  • Threat modelling and test plan aligned to relevant standards (OWASP, MITRE, CIS, NIST AI RMF).
  • Manual testing with targeted tooling validation (no “scan-and-dump”).
  • Evidence collection and severity ranking by impact and likelihood.

3) Reporting

  • Executive summary: what matters, business impact, and decisions required.
  • Technical report: reproduction steps, affected components, and remediation guidance.
  • Remediation roadmap: quick wins, strategic fixes, and recommended control uplift.

4) Retest

  • Validate fixes for agreed findings and confirm residual risk.
  • Update the report with verification notes and closure status.

Engagement options

  • Once‑off assessments (from a few days)
  • Retainers (monthly cadence with burn‑down reporting)
  • Programmes (security uplift, governance, and maturity improvement)

What we need from you

  • Primary technical contact and escalation path
  • Access method (where applicable) and test window
  • Asset inventory / endpoints / relevant documentation
tween;align-items:center">
© Global Technology Security Partners • Centurion, Pretoria, South Africa
SEO-ready static site (robots.txt, sitemap.xml, structured data).
PrivacyContactServices