Area of focus

Program Development

We evaluate cyber threats; analyze preparedness; review policies, procedures, and technical capabilities against best practices; develop policies and procedures for oversight and management of risk; and evaluate vendor cybersecurity practices.

Representative experience

For a risk assessment, we interviewed the CISO, CIO, COO, and other key stakeholders at a major ISP, then recommended a governance framework and approach in line with industry standards and legal frameworks.

We partnered with a leading forensics firm for a health review. Through key meetings and report review, we gave reassurance that the work performed could demonstrate the systems were as protected as possible.

Loading data