Using industry guidance and regulatory and technical experience, we evaluate your technology environment at all levels (business applications, database, infrastructure and network) as well as your supporting processes.
IT Governance/Infrastructure
- Policy framework
- Security development and deployment
- Change and incident management
- Segregation of duties
- Third party processors
Operations Risk
- Physical and environmental controls
- System operations
- Outside vendor access
- Data backup and recovery
- Encryption
- System maintenance and version updates
- Application controls
Cyber Risk
- Cybersecurity controls
- Configuration management
- Cybersecurity preparedness, prevention, and recovery
SOC1, SOC2 and SOC3 Engagements
- SOC data center reviews
- Third party processes user controls
Testimonials