Information Security is one of the primary concerns for corporations that use advanced communications networks as an integral part of doing
business. ITPMG Information Security Analysis and Advisory Services was built on the three fundamental security realms: Confidentiality,
Integrity and Availability. ITPMG assists customers in protecting their investments in infrastructure, data, internet applications, and their
corporate reputation. ITPMG Security Engineering Teams provide detailed analysis of your computer and network security needs. ITPMG will
review your current security architecture, conduct vulnerability analysis and make recommendations or design one for you. Our teams of
engineers will look at every aspect of security from passwords to firewalls to policies and procedures, and implement a security plan based on
industry standard “Best Practices”.
Security Risk Assessment Service
Security Risk Assessment Service
Target audience
Description
Physical Security: REMTCS Security Engineers review physical security policies that allow you to select a balance between applied security
and business requirements. ITPMG's comprehensive security offerings include:
Deliverables
ITPMG's consulting service includes an assessment of the alignment of IT efforts, and the priorities of the executive management team. This
is accomplished via discussions and/or surveys with C-level executives and high-level users. The result of the discussion is delivered via a
one-day seminar, delivered on-site at the discretion of our client.
CRO, CISO (primary), CIO, CFO, COO
Senior executives who are responsible for the current state of a company's security controls and risk management processes and
policies. This offering provides an enterprise wide framework for improving security controls and mitigating undue risk.
• Electronic Communications Plan (ECP) Implementation
• Technology Control Plans for Compliance with US Export Control Laws
• Operational Risk Assessment
• Security Framework Security Plans
• SOX Compliance
• Contingency Planning Guide
• Business Continuity Planning
• Intrusion Detection
• Vulnerability Assessments
• Penetration Testing
• Security Network Design
• Comprehensive Security Policy and Procedures
• Security Awareness Training
• Eletronic Surveilance Sweeps
Baseline Assessment - A multidimensional evaluation of existing processes and policies
Strategy Development - A roadmap for implementing the right level of general IT controls to ensure compliance with regulatory requirements.
Technology Analysis - A comprehensive review of potential technologies to review for specific security process to meet the regulatory needs.
Management Presentation - A concise presentation of risk domains that require management attention and recommendations to deal with each
effectively.