IT Risk ASSESSMENT
DOES YOUR COMPANY NEED TO ASSESS RISKS ASSOCIATED WITH SENSITIVE DATA,
SENSITIVE IT ASSETS, OR OTHER BUSINESS CRITICAL FUNCTIONS?
Does your company have security gaps?
Shoc Networks (SN) in partnership with our valued partner Flexential (FPS) will work with Customer to perform a high-level IT risk workshop based on industry standard risk guidelines, including identifying and providing recommendations for the remediation of said risks. The goal will be to swiftly make recommendations based on identified gaps in risk management practices so that Customer can take immediate actions.
This assessment workshop is being offered free of charge to our clients.
Test your companies readiness and find out how your company stands up to security threats. More importantly have a detailed road map to fixing any of these gaps. This workshop will provide such detail.
What is involved in this free assessment workshop?
Develop Project Plan
After a kick-off meeting we will develop a project plan, scheduling, and identify assessment activities, including: business risk register, business continuity plans, or prior risk assessments; server and application inventory and description; environment architecture documentation; network diagrams; data flow diagrams.
Perform Interactive Risk Workshop
This half day interactive workshop WILL require customer subject matter experts. Activities will included: organizational goals, priorities, and areas of concern; review of of Customer’s critical information assets; documented policies, procedures, and standards; review of threat sources and threat events; security practices pertinent to core risk management.
Conduct Risk Review
Utilizing results from interview and assessment sessions, we will conduct the following risk review: assessment/scoring of likelihood and impact of identified risks; Identification/documentation of known compensating controls related to identified threats; Determination of risk rating associated with identified threats.
WHAT BENEFITS WILL MY COMPANY RECEIVE FROM THIS IT ASSESSMENT WORKSHOP?
Recommendation of potential risk response measures for identified threats (acceptance, avoidance, mitigation, sharing, or transfer) to mitigate/reduce risk. These recommendations will provide a detailed road map to fixing gaps and tightening up security measures.
- Create Deliverable Report
- Outline Threats/Vulnerabilities
- Possible Risk Reduction Activities
- Formal Risk Assessment Matrix
- Focus on Higher-Level Organization
- Improve Accuracy & Effectiveness
- Business Risk Register
- Business Continuity Plans
- Network Inventory Assessment
- Network Diagrams
- Data Flow Diagrams
- Scoring of Likelihood & Impact of Risks
- Review Critical Software & Assets
- Review Threat Sources
- Determination of Risk Rating & Threats