Tilt Advisory

Who we are

Founded in 2019, we are a privately-owned company with a clear yet powerful vision: to empower businesses with the knowledge and tools needed to safeguard their IT environments. In today's rapidly evolving digital world, we believe that informed decisions are the foundation of strong security, and we are committed to being the trusted partner that helps our clients confidently navigate this complex landscape. Though we may be small, our impact extends far beyond our borders.

Our work touches businesses across the African continent, making a meaningful difference in the security posture of the organisations we partner with – thereby improving the cyber security capabilities of our continent. Every day, we take pride in offering fresh perspectives on our clients’ security challenges and specialise in tackling seemingly impossible management, risk, and compliance issues with a pragmatic, cost-effective approach.

At the heart of our business is a passion for building lasting relationships. We know that trust is earned through commitment, expertise and a genuine care for improving the security posture of every client we support. We invite you to join us on this journey, where together, we can create a safer, more resilient digital future.

What we do

Security advisory services - from the boardroom to the network.

With over 30 years of experience in the Information and Cyber Security industry, we offer a unique perspective on your security challenges and specialise in tackling seemingly impossible management, risk, and compliance issues with a pragmatic and cost-effective approach. Let us help you solve your security challenges and improve your security posture along the way.

Some of our insights

Recognising the diverse needs of our clients, over the many years we provided advisory services, we have developed a modular framework designed to structure and enhance our partnerships. This framework allows flexibility, enabling individual portfolios, or their services within, to be addressed independently or the entire framework to be implemented through an ISMS (Information Security Management System) program management approach, based on your organisation's unique needs.

Management & Governance

ISMS Program

Information Security Governance

Risk Management

Operations

Perimeter & network protection

Attack surface protection

Access management

Critical data protection

Compliane & resilience

Cyber incident management

Figure 1: Tilt Advisory security operations management framework

As we explore each portfolio in depth, we focus on the specific services within it. To strengthen your organisation's security posture, it's essential to prioritise and excel in the baseline security capabilities first. Once these are well-established, attention can then shift to enhanced security capabilities.

Cyber Incident Management

Log Monitoring

Event management (SIEM)

Incident Handling and Response

Red-teaming

Baseline Security Capabilities

Enhanced Security Capabilities

Figure 2. Example of a portfolio and it's domains

For each service, it's important to understand its purpose, how to measure its success on e.g. a monthly or quarterly basis, the factors that could impact its effectiveness, and the associated costs of maintaining the service within your organisation. When we partner with you to help you implement part or all of the framework, we work closely with you to define the specifics of each service, ensuring that it aligns with your organisation's security objectives.

TEMPLATE: SERVICE 1

Describe the objective behind this service and its contribution to the overall service portfolio / tower.

Monthly Metrics

Service level or KPI (expressed against a desired benchmark or value)

  • ODM 1
  • ODM 2
  • ODM -n

ODM is a metric that acts as both an indicator of service performance and a value lever to track whether the outcome of the investment made is being achieved.

Formula used to calculate the service level / KPI:

  • Formula 1
  • Formula 2
  • Formula -n

Influencing factors

Articulate the dependencies that influence the optimal service function - such dependencies may be organisational, risk management related or technical (e.g. policies and standards, architectures, skills, etc.)

IT friction

Business friction

  • Typical obstacles in IT that may prohibit optimal service delivery e.g. lack of dicipline, technical issues, etc.
  • Typical obstacles in line of business / in operations that may prohibit optimal service delivery e.g. lack of business support etc.

Tools and operating cost

  • Cost of enabling technology
  • Cost of staffing
  • Cost of service operation over and above direct service enabling technology and staffing (may include dependencies, impact on other services etc.)
  • List of tools used in the environment to implement and maintain this service

Figure 3. Example of a service description

One of the most important and rewarding steps is helping you determine the return on investment for each service. This enables you to assess whether you’re overspending or underspending on a particular service, refocus your cybersecurity strategy, and engage in more informed discussions with your leadership team or Board.

Let us help you enhance your security posture, one step at a time.

Contact Us

Address:

1c College Avenue
Bryanston, Gauteng
2191
South Africa

Email: info@tilt-advisory.co.za