Global Cyber Risk (GCR)

Global Cyber Risk (GCR)

Global Cyber Risk (GCR) is a technology and advisory services firm that provides first tier cybersecurity services to both large corporations and small and mid-sized businesses.

GCR has earned industry respect for its expertise in internationally accepted best practices and standards for cybersecurity programs.  GCR’s proprietary methodologies have been used in every industry sector and by some of the largest global corporations.  GCR has modified its methodologies to also effectively assist small and mid-sized businesses in a cost-effective manner.

We specialize in:
- Cyber risk assessments and cyber loss valuations
- Assistance to boards and senior executives in managing cyber risks and exercising effective oversight
- Development of cybersecurity programs
- Incident response planning and scenario exercises
- Data and application inventories and data mapping
- Vulnerability scanning and remediation assistance

Contact Information

Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cisco Systems

Cisco Systems

Cisco's threat-centric approach to network security reduces complexity while providing superior visibility, continuous control and advanced threat protection.

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

Vectra Networks

Vectra Networks

Vectra provides real-time attack visibility and non-stop automated threat hunting powered by artificial intelligence.

CySec Ice Wall

CySec Ice Wall

CySec Network Data Vault records a full audit trail of all network traffic to enable root cause analysis and forensic investigation.

Computer Forensic Specialists

Computer Forensic Specialists

Computer Forensic Specialists are leading forensic consultants and have been providing litigation support for electronic evidence since 1996.

ECS

ECS

ECS is a leading information technology provider delivering cloud, cybersecurity, software development, IT modernization, and advanced science and engineering services.

The Cyber Security Expert

The Cyber Security Expert

The Cyber Security Expert delivers cyber security consultancy, website and cloud security monitoring services, and specialist training services.

Airbus Bizlab

Airbus Bizlab

Airbus BizLab is a global accelerator, where startups and Airbus entrepreneurs speed up the transformation of innovative ideas into valuable businesses. Areas of focus include AI and Cybersecurity.

QNu Labs

QNu Labs

QNu Labs’s quantum-safe cryptography products and solutions assure unconditional security of critical data on the internet and cloud across all industry verticals, globally.

Constella Intelligence

Constella Intelligence

Constella Intelligence provides digital risk protection services to quickly and efficiently disrupt cyber attacks and data breaches before they occur.

SecureTech360

SecureTech360

SecureTech360 is a cybersecurity and IT consulting firm whose principals have extensive experience in Cybersecurity and Information Technology.