Security Assessments Overview
Let us help you to understand where you are on the maturity level when it comes to Cybersecurity!
​
First we will begin with an on-site Security Program Maturity assessment which includes a deep dive into the below (list is not fully inclusive):
-
Policy Management
-
Awareness & Education
-
Incident Response & Detection
-
Identity & Access Management
-
Vulnerability Management
-
Security Infrastructure Management
-
As well as many other areas of which to focus on...
​
After the assessment is completed, we will define a roadmap of which your company can drive to in order to achieve your goals. The main objective is to determine security technologies and capabilities required to maintain information security at a level that matches the companies risk appetite and meets a common due standard of care.
-
The security roadmap is a 3 year plan at a point in time, and will likely require adjustments along the way.
-
Deployment of new security solutions will attempt to balance cost, deployment risk and enterprise value.
​
Technologies we can assist in deploying or consulting in to achieve your roadmap success:
-
Mobile Device Management
-
Web Application Firewall
-
Wireless Security
-
Backup Media Encryption
-
Disk Encryptions for Laptops
-
Remote Access - VPN
-
Web Application Vulnerability Management
-
USB Encryption and Controls
-
Data Loss Prevention both Network and Host side
-
Multi-Factor Authentication
-
Data Masking
-
SIEM Deployment and/or Expansion
-
And Many More...
​
Once those items are mapped out and either technologies or policies/processes are defined to mitigate those defined risks we define the initiative to deployment risk ultimately defining what value(s) the initiative brings to your company.