Tilt Advisory
Who we are
Founded in 2019, we are a privately-owned company with a clear yet powerful vision: to empower businesses with the knowledge and tools needed to safeguard their IT environments. In today's rapidly evolving digital world, we believe that informed decisions are the foundation of strong security, and we are committed to being the trusted partner that helps our clients confidently navigate this complex landscape. Though we may be small, our impact extends far beyond our borders.
Our work touches businesses across the African continent, making a meaningful difference in the security posture of the organisations we partner with – thereby improving the cyber security capabilities of our continent. Every day, we take pride in offering fresh perspectives on our clients’ security challenges and specialise in tackling seemingly impossible management, risk, and compliance issues with a pragmatic, cost-effective approach.
At the heart of our business is a passion for building lasting relationships. We know that trust is earned through commitment, expertise and a genuine care for improving the security posture of every client we support. We invite you to join us on this journey, where together, we can create a safer, more resilient digital future.
What we do
Security advisory services - from the boardroom to the network.
With over 30 years of experience in the Information and Cyber Security industry, we offer a unique perspective on your security challenges and specialise in tackling seemingly impossible management, risk, and compliance issues with a pragmatic and cost-effective approach. Let us help you solve your security challenges and improve your security posture along the way.
Some of our insights
Recognising the diverse needs of our clients, over the many years we provided advisory services, we have developed a modular framework designed to structure and enhance our partnerships. This framework allows flexibility, enabling individual portfolios, or their services within, to be addressed independently or the entire framework to be implemented through an ISMS (Information Security Management System) program management approach, based on your organisation's unique needs.
Management & Governance
ISMS Program
Information Security Governance
Risk Management
Operations
Perimeter & network protection
Attack surface protection
Access management
Critical data protection
Compliane & resilience
Cyber incident management
Figure 1: Tilt Advisory security operations management framework
As we explore each portfolio in depth, we focus on the specific services within it. To strengthen your organisation's security posture, it's essential to prioritise and excel in the baseline security capabilities first. Once these are well-established, attention can then shift to enhanced security capabilities.
Cyber Incident Management
Log Monitoring
Event management (SIEM)
Incident Handling and Response
Red-teaming
Baseline Security Capabilities
Enhanced Security Capabilities
Figure 2. Example of a portfolio and it's domains
For each service, it's important to understand its purpose, how to measure its success on e.g. a monthly or quarterly basis, the factors that could impact its effectiveness, and the associated costs of maintaining the service within your organisation. When we partner with you to help you implement part or all of the framework, we work closely with you to define the specifics of each service, ensuring that it aligns with your organisation's security objectives.
Portfolio 1
Service 1.1
Service 1.2
Service 1.-n
Portfolio 2
Service 2.1
Service 2.2
Portfolio -n
Service -n.1
TEMPLATE: SERVICE 1
Describe the objective behind this service and its contribution to the overall service portfolio / tower.
Monthly Metrics
Service level or KPI (expressed against a desired benchmark or value)
- ODM 1
- ODM 2
- ODM -n
ODM is a metric that acts as both an indicator of service performance and a value lever to track whether the outcome of the investment made is being achieved.
Formula used to calculate the service level / KPI:
- Formula 1
- Formula 2
- Formula -n
Influencing factors
Articulate the dependencies that influence the optimal service function - such dependencies may be organisational, risk management related or technical (e.g. policies and standards, architectures, skills, etc.)
IT friction
Business friction
- Typical obstacles in IT that may prohibit optimal service delivery e.g. lack of dicipline, technical issues, etc.
- Typical obstacles in line of business / in operations that may prohibit optimal service delivery e.g. lack of business support etc.
Tools and operating cost
- Cost of enabling technology
- Cost of staffing
- Cost of service operation over and above direct service enabling technology and staffing (may include dependencies, impact on other services etc.)
- List of tools used in the environment to implement and maintain this service
Figure 3. Example of a service description
One of the most important and rewarding steps is helping you determine the return on investment for each service. This enables you to assess whether you’re overspending or underspending on a particular service, refocus your cybersecurity strategy, and engage in more informed discussions with your leadership team or Board.
Let us help you enhance your security posture, one step at a time.
Contact Us