Gap Analysis

Readiness Assessments

Risk Assessments

Disaster Recovery / Business Continuity

IDENTIFY, CATEGORIZE, AND ASSESS SECURITY PROGRAM GAPS, AND THEN DEFINE REMEDIATION STEPS.

Assessments based on Industry Recognized Framework Standards

HIPAA • HITRUST • NIST-CSF • NIST 800-53r4 (FISMA) • NIST 800-171 • ISO 27001 • SOC 1 and SOC 2 • State and Local security requirements

Q&A WITH DIRECTOR OF CYBER RISK & COMPLIANCE

Full Assessments Based on Security & Privacy Programs

What controls do you need to mitigate risk?

The risk assessment is likely to pinpoint many of these. For most companies, the best time to do the risk assessment is at the start of the project so you learn what controls you do and do not need.

LEARN MORE ABOUT ASSESSMENTS

Cyber Risk & Compliance Service Offerings

100% Customer Focus

ADVISORY

A "Listen First" approach to review your current architecture and provide a roadmap to maturity.

Discovery Engagements
  • CRC Strategic Workshop
  • CRC Domain Gaps
  • Roadmap Recommendations
Advisory Engagements (Program Development)
  • Security Policies and Procedures
  • Business Continuity / Disaster Recovery Planning
  • BIA / DR Creation and Review
  • SSP Creation

DELIVERY

Working with your business objectives to deliver the right solution, the first time.

Assessments
  • GAP (NIST, ISO, etc)
  • Maturity
  • Data Sensitivity
Workshops
  • Info Security Program
  • High Level Best Practices
  • Specific GRC Topics
Operations
  • Staff Augmentation
  • Strategic Staffing

TECHNOLOGY & ROADMAPS

Your custom route to meet your objectives and maintain compliance.

Delivery & Roadmaps
  • Archer (Current vs. Future, Mapping Business Processes to Technology, Implementation Plan)
  • OnSpring (Current vs. Future, Mapping Business Processes to Technology, Implementation Plan)
  • Enterprise Risk Management (BC/DR, Risk Mgmt, Risk & Compliance, Audit, Third-Party Risk)
  • IT Risk Management (Vulnerability Mgmt, Incident Mgmt, Asset Mgmt, Security Procedures)