Information security continues to be one of the primary concerns for both commercial enterprises and government agencies. The ITPMG
Information Security Analysis and Advisory Services are built on the three fundamental security realms: Confidentiality, Integrity and
Availability.
Clients need help in protecting their investments in infrastructure, data, Internet applications, software development, and their
corporate/agency reputation. To do that clients need to focus on the people, technology and processes that they use to execute their IT
security strategy and plan.
IT Security Process Assessment Service
IT Security Process Assessment Service
Target audience
Description
ITPMG assists clients in protecting their investments in infrastructure, data, internet applications, and their corporate/agency reputation. To
do that we focus on those things that matter most in ensuring an optimized IT security plan: people, technology and processes.
The new IT Security Process Assessment addresses one of the key pillars of risk avoidance in the IT security environment - IT security
processes and the overall business processes.
ITPMG security teams will assess, analyze and evaluate the applicable process and provide an analysis of that process. That analysis can
range from a readiness assessment report to a more detailed certification review and report, depending the process.
The team can provide insights into how effective the process is, how its execution of the compares to best practices, whether or not the
client may be compliant with process regulations and procedures and provide recommendations as to what needs to be done to improve
execution and minimize any risk associated with current execution.
ITPMG's IT Security Process Assessment Services support the following processes, among others:
Deliverables
Readiness Assessment - A multidimensional evaluation of existing applicable process, related policies and procedures to determine the
readiness of an organization to execute the applicable process.
Certification Assessment - A multidimensional evaluation of existing applicable process, related policies and procedures to determine if the
organization can be certified and be issued a certification or compliance document.
CRO, CISO (primary), CIO, CFO, COO
Senior executives who are responsible for the current and future state of an organization's IT Security controls and risk management
processes, policies and applicable regulations.
• NIST Cybersecurity Framework
• General Data Protection Regulation (GDPR)
• NERC-CIP
• HIPPA
• ISO 27000
• C2M2
• PCI-DSS
• FFIEC