INFORMATION SECURITY GOVERNANCE

Compliance ∙ Risk Mitigation ∙ Value

vciso

Advisory

All the benefits of a CISO without the high cost. Provided on retainer as an ongoing service to meet your organizational risk management and compliance challenges.

Information Security Program Management

All organizations need to have a plan to ensure the security of your information assets no matter how large or small.

Solutions and engagements

Executive and Staff Training

Provide clarity for your executive, board members, or management with tailored education specific to their concerns and train staff to provide them the knowledge, tools, and ability to identify and act to protect the organization.

Privacy Programs and Risk Response

Organizations face constant change in both the regulatory environment as well as the tools, techniques, and procedures used by attackers. We can augment your response and provide insight.

Policy and Procedure

Appropriate and effective policies and procedures are an important part of an organizations structure. Review and evaluation of existing, or creation of, policy and procedures to meet operational goals.

Technical Solutions

Penetration Testing and Vulnerability Assessments

Effective management of vulnerabilities and testing gaps is an important part of securing the organization.

System Analysis, Evaluations, and Engineering

Technology forms part of a good security posture.  Ensure your technical security posture is appropriate.

One Comment

  1. A WordPress Commenter

    Hi, this is a comment.
    To get started with moderating, editing, and deleting comments, please visit the Comments screen in the dashboard.
    Commenter avatars come from Gravatar.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>