Cyber Security Practice Overview

Cyber Security Public Relations Professional Practice Overview

LIQUID is a highly competent cyber security firm managing cyber security issues as a core competency of our firm’s commitment to protecting trust.  Cyber security is one of the most serious economic and national security threats to our nation, economic infrastructure, and business sector.  Your organization's future depends on resilient Information Security Management Systems (ISMS).

LIQUID’S 360° Cyber Security practice focuses on the continually evolving threat of cyber-attacks.  We develop strategic solutions, working within your organization, to actively manage the risks cyber-attacks present to business continuity and facilities management.  Our firm works with leading software vendors to enable your organization to deploy strategic cyber security solutions and stay ahead of the constant threat of cyber-attack.

LIQUID Communications: SOC 1 SSAE 16 Type II and III Auditors

Through this distinction our firm provides sound and expert advice concerning cyber security issues, internal controls, pre-audit consultation, and ISMS development.  In the event of human or technology failures, intrusions, or cyber-attacks, we stand ready to aggressively defend your organization.  Our unique industry experience provides LIQUID with high level knowledge concerning cyber security issues, making our firm a leading authority in the development of internal controls, corresponding controls, and communication strategies.  Our comprehensive understanding of technology related issues and our experience in cyber security communication provides you with a partner you can trust when communicating the most sensitive issues to your publics.

ISO/IEC 27001 – The Information Security Management System (ISMS)

The objective of the standard itself is to provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining, and improving an ISMS. Each ISMS is unique; however, the rigid standard contemplates multiple components of your organizations ISMS.  The design and implementation of an organization's ISMS is influenced by the organization's needs and objectives, security requirements, processes employed, and the size and structure of the organization.

The application of a system of processes within an organization, together with the identification and interactions of these processes and their management, create your organization’s ISMS. It should include a strategic Plan-Do-Check-Act model and structure processes as reflections of core principals set forth in applicable ISO/IEC superstructures.

ISO/IEC 27002:2005 Control Objectives

ISO/IEC 27002:2005 establishes guidelines and general principles for initiating, implementing, maintaining, and improving information security management systems within in an organization. The objectives provide guidance on the commonly accepted goals of information security management. ISO/IEC 27002:2005 contains best practices of control objectives in the following areas of information security management:

  • security policy
  • organization of information security
  • asset management
  • human resources security
  • physical and environmental security
  • communications and operations management
  • access control
  • information systems acquisition, development and maintenance
  • information security incident management
  • business continuity management

Always On.

We're always ready, day or night, to deliver the best strategic communication advice to your company or organization.

Good forecasting is accurate, timely and reliable. We get to the heart of what's at stake fast to help our clients predict important outcomes and see a fuller range of strategic options.

Contact Us.