.png)

Our Services
Security
-
Interim CISO Services
-
vCISO and CISO On-Call
-
IT Security Posture / Maturity Assessment and Improvement
-
Security Program Support and Implementation
-
Policies, Procedures, and Standards Development
-
Application and Vendor Security Requirements
-
Custom Training Programs: Security Awareness, Privacy, HIPAA, Incident Response
Risk
-
IT Risk Assessments for:
-
Compliance
-
Due Diligence
-
Post-Incident & Data Breach
-
Pre/Post Merger and Acquisition (M & A)
-
-
Prioritized IT Risk Mitigation Road Map & Strategic Planning
-
IT Risk Program Support and Implementation
-
IT Security / CyberSecurity Threat Risk Analysis
-
Preventative Controls Analysis and Risk Strategy
Compliance
-
PCI Readiness / Gap Assessments & Remediation
-
Scope Identification and Reduction Strategies
-
HIPAA IT Controls Audit
-
SOX Internal Controls Audit
-
ISO 9001 and 27000 Compliance Assessments
-
GDPR Assessments
-
IT Compliance Program Support & Implementation
-
Remediation Services and Project Management
Due Diligence
-
IT Operations Assessment for pre/post M & A
-
Business Intelligence and Competitive Analysis
-
Vendor / Business Partner Requirements Dev / Vetting
-
Due Diligence Investigations
-
IT Fraud Investigations
-
Internal Threat Evaluation
-
Third-party Service Provider Security Assessments
-
Application / Product Security Requirements Development and Vetting
-
Cybersecurity Insurance Vetting and Investigations
ITIL / ITSM
and BPM
-
ITIL Readiness Assessments
-
Partial-Full ITIL Implementation
-
ITSM (IT Service Management) Evaluation & Customer Service Improvement Strategies
-
Business and Application Analysis and Mapping
-
Business Process Management (BPM) Documentation, Design, & Automation Implementation
-
Application Data Flow Diagrams and Documentation
-
Business Process Flow Diagrams and Improvements
Incident and
Breach Response
-
Post Incident / Data Breach: Residual Risk Assessment, Remediation and Mitigation, Forensic Investigations
-
Third-party Service Provider Risk Evaluation
-
Incident Response Handling Assessment & Improvement
-
Incident Response Training and Documentation
-
Vulnerability and Threat Analysis & Mitigation
-
Cybersecurity Insurance Evaluation and Assistance