Protect

Security Implementation & Remediation

Information Security Outsourcing and Co-sourcing

Enterprise Risk Management can help your organization with interim IT resource needs to ensure that you can efficiently and effectively execute your IT strategy. ERM offers interim IT resources for:

  • Executive level CISO
  • Management level IS
  • Staff level IS

ERM also provides Outsourcing and Co-sourcing services using a flexible approach based upon your specific needs, culture and operating model. We offer services for the following functions:

  • IT Audit – providing you IT planning, risk assessment, and testing over one or more areas resulting in the identification of deficiencies, recommendations for remediation and an opinion
  • LogWatch Security Log Review – An analysis of key infrastructure logs to identify and follow up on security issues or incidents
  • Vendor Management Monitoring – providing you on-going monitoring services in accordance with your Vendor Management program
  • Cyber Breach Toll-Free Hotline – providing you a scalable, resilient call center for incident response enrollment, program or product questions and problems with associated breaches such as identity theft
    • Security Incident Response Management – providing you on-going support related to incident preparation, detection and analysis, digital forensic services, containment, eradication and recovery and post incident activity
    • Security Breach Investigation and Forensics – providing you comprehensive forensic investigatory services that identify, preserve, analyze and present evidence relating to the incident
    • Security Awareness Training – providing you a continuous training program that addresses security threats and the roles and responsibilities of employees of your organization

Security Remediation

ERM offers security remediation services to help your organization close gaps identified internally, or externally. Our approach considers the people, technology, processes, and interdependencies in your organizational structure and business model. We can help your reduce security threats and risks identified
in one or more of the following areas:

  • Security Breach/Incident Remediation
  • Regulatory Examination Deficiencies
  • Penetration and Vulnerability Test Results
  • Regulatory Compliance Assessment Deficiencies
  • Security Baseline Assessment Deficiencies
  • IT Audit Deficiencies
  • Service Provider SOC 1, 2, and 3 Attestation Deficiencies
  • Privacy Assessment Deficiencies
  • IT Risk Assessment Results
Sign Up for Our Newsletter