Key Differentiators of Panda Bear Consulting

Panda Bear Consulting consultants come from different backgrounds including technical and legal fields, this ensures pragmatic compliance respectful of the rules but also of the needs of the business.

Our company is providing a full suite of easy-access and customizable tools, procedure templates, and controls to ease security management.

Our missions meet the following objectives:

· Implement an Information Security Management System (ISMS)

· Implement a Risk Management System

· Manage ISMS according to standards and best practices.


Quality of our consultants:

All have the expertise and some of them are certified, either in implementation or audit in one or more of the following areas:

· ISO/IEC27001:2022 Information security, cybersecurity, and privacy protection — Information security management systems — Requirements.

· ISO/IEC 27002:2022 Information security, cybersecurity, and privacy protection — Information security controls

· ISO/IEC 27005:2022 Information technology – Security techniques – Information security risk management.

· ISO/IEC 27011: Information technology – Security techniques – Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations

· ISO/IEC 27017: Information technology – Security techniques – Code of practice for information security controls based on ISO/IEC 27002 for cloud services.


· ISO/IEC 27018: Information technology – Security techniques – Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors

· ISO/IEC 27018: Information technology – Security techniques – Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors

· ISO/IEC 27031:2011 Information technology – Security techniques – Guidelines for information and communication technology readiness for business continuity.

· ISO/IEC 27032:2012 Information technology – Security techniques – Guidelines for cybersecurity.

· ISO/IEC 27701:2019 Security techniques – Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management – Requirements and guidelines


CISO as a Service

Panda Bear Consulting provides customers with a Chief Information Security Officer (CISO) who has the experience and capabilities needed to assist, develop, create and implement a unique security strategy.

The CISO has a strong background in IT leadership, security management, and compliance and is well-versed in risk management.
We can also dedicate more entrepreneur-type profiles during deployment and switch to a more controller-type profile for day-to-day management.