Governance Risk and Compliance
Due to the increasing dependence on a digitally enhanced infrastructure, CIOs face a unique challenge of striking the right balance between protection and privacy, growth and progress. We have the experience and expertise to help our customers build an information security risk office (IS/RO) using IT security solutions, or transform any existing IS/RO offices that might be working in silos or on fragmented/ad-hoc requirements today.
- Process– Policy and procedure definition, gap analysis, re-base lining, risk assessment framework setup, ITSM, metrics, KPI’s periodic audits, exec reports
- People– ISMS awareness, rollout roles and responsibilities, 3rd party security assessments, contractual compliance, access reviews privileged user compliance
- Data– Data governance, ownership, classification, labelling, data risk assessment, cross border protection, data protection act, Pll compliance
- Infrastructure– Security baseline (standards, patches, and security configuration), IT risk assessment, Risk mitigation, Security configuration & compliance, SLA’s service delivery
- Applications– SLA’s, CIA assessments, service delivery, application risk management, access reviews, SDLC, ITSM