Business Valuation Services for Pharmaceutical Company
- Business Valuation Services Cybersecurity
- Confidential
- Jan. 2023 - Jan. 2026
- Quality
- 5.0
- Schedule
- 5.0
- Cost
- 5.0
- Willing to Refer
- 4.5
"They're very professional and self-motivated for the project."
- Pharmaceuticals
- Karachi, Pakistan
- 201-500 Employees
- Online Review
Novasecuris provides cybersecurity services for a pharmaceutical company. The team conducts risk assessments, develops policies and procedures, implements firewalls, and secures endpoints, among other tasks.
Thanks to Novasecuris, the client has achieved a 40% reduction in critical vulnerabilities, a 95% threat mitigation rate, and a 100% asset inventory. The team is professional, self-motivated, and responsive to the client's needs. Moreover, their communication via in-person meetings is effective.
The client submitted this review online.
BACKGROUND
Please describe your company and position.
I am the Commercial Director of a pharmaceuticals company
Describe what your company does in a single sentence.
We are a pharmaceutical company which manufactures antibiotics, pain killer injections, eye drops and general medicines for local and international markets.
OPPORTUNITY / CHALLENGE
What specific goals or objectives did you hire Novasecuris to accomplish?
For securing cloud services
SOLUTION
How did you find Novasecuris?
- Online Search
- Other
Why did you select Novasecuris over others?
High ratings
How many teammates from Novasecuris were assigned to this project?
2-5 Employees
Describe the scope of work in detail. Please include a summary of key deliverables.
Key Activities:
1. Risk Assessment:
- Identify critical assets (data, systems, infrastructure).
- Evaluate potential vulnerabilities and threats.
- Quantify the likelihood and impact of cyber risks.
2. Policy and Procedure Development:
- Create cybersecurity policies (e.g., access control, data protection, incident response).
- Define compliance requirements (e.g., GDPR, ISO 27001, PCI DSS).
3. Network Security:
- Implement firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS).
- Secure endpoints, servers, and cloud systems.
4. Data Protection:
- Encrypt sensitive data.
- Ensure secure data storage and transmission.
- Conduct regular backups and recovery tests.
5. Access Management:
- Use multi-factor authentication (MFA) and role-based access controls (RBAC).
- Monitor and audit user access logs.
6. Threat Monitoring and Incident Response:
- Set up Security Information and Event Management (SIEM) systems.
- Detect and respond to cyber incidents in real time.
7. Employee Awareness and Training:
- Conduct regular training sessions on phishing and social engineering.
- Simulate attacks to test readiness.
8. Regular Audits and Penetration Testing:
- Assess system vulnerabilities.
- Simulate attacks to evaluate defenses.
Asset Valuation Scope of Work
Asset valuation identifies and quantifies the value of organizational assets to prioritize their protection.
Key Activities:
1. Inventory of Assets:
- Create a comprehensive list of all physical and digital assets (hardware, software, databases, intellectual property).
- Categorize assets based on criticality and purpose.
2. Valuation Framework Development:
- Define methods for valuing assets (e.g., cost-based, income-based, or market-based approaches).
- Establish valuation criteria like replacement cost, operational value, or revenue contribution.
3. Business Impact Analysis (BIA):
- Assess the financial and operational impact of asset loss or downtime.
- Identify dependencies between assets.
4. Risk-Based Prioritization:
- Evaluate the risks associated with each asset.
- Assign protection priorities based on value and risk exposure.
5. Continuous Updates:
- Update asset valuation and inventory regularly to reflect changes (e.g., new systems, retirements).
Key Deliverables:
1. For Cybersecurity:
- Comprehensive risk assessment report.
- Cybersecurity policies and procedures manual.
- Incident response and disaster recovery plans.
- Network and data protection architecture.
- Regular security audit reports.
2. For Asset Valuation:
- Detailed asset inventory.
- Asset valuation report (with assigned monetary values).
- Risk prioritization matrix.
- Business impact analysis report.
- Recommendations for protecting high-value assets.
Integration of Cybersecurity and Asset Valuation:
- Combining cybersecurity with asset valuation allows organizations to focus resources on protecting their most valuable and vulnerable assets, reducing risks effectively while optimizing costs.
RESULTS & FEEDBACK
What were the measurable outcomes from the project that demonstrate progress or success?
1. Cybersecurity Outcomes
Key results reflect improved system defenses, reduced risks, and enhanced incident management.
a. Risk Reduction Metrics:
- Reduction in Vulnerabilities:
- Percentage decrease in critical vulnerabilities identified during penetration testing. (Example: A 40% reduction in critical vulnerabilities over six months).
- Threat Mitigation Rate:
- Number of identified threats neutralized or mitigated. (Example: 95% of identified threats mitigated within the project timeline).
b. Incident Response Improvements:
- Faster Detection and Response Time:
- Reduction in the time taken to detect and respond to incidents (e.g., mean time to detect (MTTD) and mean time to respond (MTTR)). (Example: MTTD reduced from 10 hours to 2 hours).
- Number of Prevented Incidents:
- Successful prevention of attacks (e.g., phishing attempts, ransomware attacks). (Example: 500+ phishing emails blocked in the first quarter).
c. System and Network Security:
Increased Endpoint Protection:
- Percentage of devices secured with endpoint protection and encryption. (Example: 100% of organizational laptops and mobile devices encrypted.)
- Firewall and IDS/IPS Effectiveness:
- Number of intrusion attempts blocked or flagged by new systems. (Example: 98% of intrusion attempts flagged successfully.)
d. Compliance and Audit Readiness:
Regulatory Compliance:
- Successful audit results showing compliance with standards like GDPR, ISO 27001, or PCI DSS. (Example: No non-compliance issues raised during external audits.)
- User Awareness:
- Improvement in employee awareness (measured via post-training assessments). (Example: Awareness test scores improved by 60%).
2. Asset Valuation Outcomes
Key results focus on asset prioritization, risk management, and cost optimization.
a. Asset Prioritization and Inventory:
Comprehensive Asset Inventory:
- Complete identification of all assets with associated valuation and risk scores. (Example: 100% of organizational assets inventoried and valued.)
- Risk-Based Asset Prioritization:
- Creation of a ranked list of assets based on value and associated risks. (Example: High-value critical assets identified and assigned top protection priorities.)
b. Financial Metrics:
Accurate Valuation of Assets:
- Assigning precise monetary values to tangible and intangible assets. (Example: Total valuation of intellectual property: $2.5M.)
- Cost Savings from Optimized Protection:
- Reduction in cybersecurity expenses through focused resource allocation. (Example: $250K saved annually by prioritizing protection of high-value assets.)
c. Business Impact Analysis (BIA):
Recovery Time Objectives (RTO) Defined:
- Establishing realistic and achievable recovery time for critical systems. (Example: RTO reduced from 8 hours to 4 hours for key applications.)
- Improved Risk Mitigation Strategies:
- Reduction in potential financial losses due to risk mitigation. (Example: Estimated loss from a cyberattack reduced from $1M to $200K.)
3. Holistic Indicators of Success:
Reduced Downtime:
- Percentage decrease in unplanned system downtime due to cyber incidents. (Example: Unplanned downtime reduced by 70%.)
- Improved Customer Trust:
- Increase in customer satisfaction or trust metrics post-implementation. (Example: Customer satisfaction score improved by 15%.)
- Enhanced Organizational Resilience:
- Overall improvement in the ability to withstand and recover from cyber threats. (Example: Zero data breaches reported in the first year after project implementation.)
Conclusion:
Measurable outcomes like reduced vulnerabilities, faster incident response, accurate asset valuation, and improved compliance demonstrate the tangible success of cybersecurity and asset valuation projects. These metrics not only validate progress
Describe their project management. Did they deliver items on time? How did they respond to your needs?
Yes they fully satisfied us
What was your primary form of communication with Novasecuris?
In-Person Meeting
What did you find most impressive or unique about this company?
They're very professional and self-motivated for the project
Are there any areas for improvement or something Novasecuris could have done differently?
We don't think so
RATINGS
-
Quality
5.0Service & Deliverables
-
Schedule
5.0On time / deadlines
-
Cost
5.0Value / within estimates
-
Willing to Refer
4.5NPS