Cybersecurity
Who We Are
Our cybersecurity consulting team is committed to delivering specialized expertise. In the dynamic realm of cyber
threats, we partner with organizations to evaluate their cybersecurity readiness and devise strategies for bolstering
resilience. Our seasoned professionals pinpoint vulnerabilities and propose robust security measures to safeguard
against cyber attacks.
enabling us to effectively assist clients in both implementation and audit processes.
Our cybersecurity consulting team is committed to delivering specialised expertise. In the dynamic realm of cyber threats, we partner with organisations to evaluate their cybersecurity readiness and devise strategies for bolstering resilience. Our seasoned professionals pinpoint vulnerabilities and propose robust security measures to safeguard against cyber attacks.
Certifications of team members include:

CISSP (Certified
Information Systems
Security Professional)

OSCP (Offensive
Security Certified
Professional)

CISA (Certified
Information Systems
Auditor)

CRISC (Certified in
Risk and Information
Systems Control)

ISO/IEC 27001
Lead Auditor
Our Cybersecurity Services
Penetration Testing
Penetration testing, often referred to as ethical hacking, is a proactive cybersecurity assessment process designed to identify and assess vulnerabilities in information systems, networks and applications. The primary goal of penetration testing is to simulate real world cyberattacks to discover weaknesses in your system that malicious actors could exploit. Penetration testing is often a requirement for compliance with industry regulations and standards. It helps organizations meet the cybersecurity testing requirements outlined in frameworks such as PCI DSS, ISO/IEC 27001, as well as Georgian law on information security.
Red Teaming
Red teaming is an advanced cybersecurity assessment technique that involves simulating real-world cyber threats to evaluate how an organization would respond to a genuine cyberattack. Unlike traditional penetration testing, which focuses on specific vulnerabilities, red teaming takes a holistic and adversarial approach, attempting to emulate the tactics, techniques, and procedures of sophisticated attackers. By simulating actual attackers’ behaviour and using multiple techniques, red teaming exercise helps organisations understand their weaknesses.
IT Audit / Cybersecurity Audit
Information Technology audit is a process of evaluating and assessing information systems, technology infrastructure, and related processes to ensure that they are effectively supporting the organization’s goals, are secure, and comply with relevant regulations and standards. The primary objective of IT audit is to identify and mitigate risks associated with information technology and to ensure the integrity, confidentiality, and availability of data.
Eddwise provides compliance based IT audits such as evaluation of compliance with:
• Georgian Law on Information Security • Swift’s Customer Security Programme
• Cybersecurity Framework of National Bank of Georgia • As well as IT and Cybersecurity process audits
- Georgian Law on Information Security.
- Cybersecurity Framework of National Bank of Georgia.
- Swift’s Customer Security Programme.
- As well as IT and Cybersecurity process audits.
Cybersecurity Program Assessment
Eddwise evaluates the ability of existing processes, policies and technology to address cybersecurity risks relevant to the organization. Assessment process is customised based on the business context and needs of the client including regulatory and contractual requirements, industry specific threats and exposure.
Assessment process consists of the following steps:
- Review the cybersecurity framework of the organization.
- Define a desirable state of maturity.
- Conduct gap analysis and provide recommendations to address identified gaps.
