What is the next step in your program

A Complete Security Blueprint

This blueprint breaks our service offerings out into a roadmap for your organization to follow. By analyzing your existing program, work completed, and using our categorization—ongoing and foundational—you should be able to place yourself and get an idea of what’s next for your security program.

Ongoing Engagements

These are services that information security programs of all maturity levels might implement and benefit from.

vCISO (Virtual CISO)

Virtual CISO is an all-encompassing engagement. A vCISO will help identify what initiatives and technologies are needed and when they are appropriate to deploy, regardless of the overall maturity of your security program.

vCISO Services

Risk Assessment and Roadmap

Quantify risk, prioritize remediation actions, and establish a baseline security posture. Risk assessments identify and quantify risk, providing a roadmap of actions to be taken to improve your organization’s security posture.

Risk Assessments

Foundational Services

These services provide the framework your security program and ensure that the basics are firmly in place. The fundamentals are often overlooked or hastily completed, so these steps are crucial to addressing easily exploited gaps in your security.

Risk Assessment & Roadmap

  • Quantify risk
  • Prioritize remediation actions
  • Establish a baseline security posture

Risk assessments identify and quantify risk, providing a roadmap of actions to be taken to improve your organization’s security posture.

Risk Assessments

Policy Coaching

  • Sets the framework for the program
  • Formalizes things like risk assessment and penetration testing frequency
  • Defines things like acceptable use of systems

Policy coaching is intended to educate clients on what should be included in policies and WHY those things are included.

Policy Templates

Asset Management

  • Know what systems you have
  • Know what software is installed and where 
  • Know what data/information you have and where 

You can’t secure what you don’t know you have. If you experience a compromise, do you know what data and systems have potentially been affected?

IR/DR Plan Coaching

  • Having a plan in place can significantly reduce the impact of an incident/disaster if one does occur
  • Should be updated and tested annually

This coaching is done with the organization’s team to ensure that the IR/DR plan is comprehensive. It also helps educate the organization on the different roles and responsibilities in each plan.

Regular External/Internal Vulnerability Scanning

  • Identify openings that allow attackers to infiltrate your network
  • Ensure patches are applied properly

Verify your patch management tool is doing what you think it is by regularly scanning to double-check.

Attack Simulation

Vulnerability Management

  • Asset Management
  • Vulnerability Scanning
  • Remediation, Prioritization and Assistance

Vulnerability Management helps companies understand what they need to secure, identify gaps in their security, and how to implement the fixes.

Vulnerability Management