Managing IT Assets lifecycle is a collaborative effort that involves Information Security, IT Risk Management, IT project management, System Infrastructure, Procurement and more.
Managing the list of systems in the organization, managing and documenting the periodic surveys and planning a work plan for execution according to the level of risk and criticality of the systems.
Managing Access Rights lifecycle is a collaborative effort that involves Information Security, IT Risk Management, IT project management, System Infrastructure, Procurement and more.
Managing questionnaires and sets of controls, Sending questionnaires, creating internal mitigation tasks or tasks for your supplier. Includes dashboards for holistic view of a supplier, of business units or of sectors.
Managing compliance with all relevant standards, regulations, laws, policies and needed requirements. Manage every relevant clause separately, with its own test frequency. Enabling task delegation to internal or external professionals.
Facilitating the entire risk management flow - from providing business context through connections to units and processes, to calculating inherent risk with pre-built configurable matrices, and residual risk using vulnerabilities, scenarios and compensating controls.
Manage the BC lifecycle from mapping relevant infrastructure, units, processes, personal and technological assets to creating scenario specific mitigation plans. Exercise in order to verify playbooks. And finally, use the situation room model for real-time handling of a crisis.
Practicing and exercising in order to make sure all of senior management and personnel knows what to do when a crisis occurs. Using the same method for the actual situation room for fast and seamless adaptation for real-time crises.
Enabling frequent practicing and exercising to prepare senior management and personnel for a cyber crisis, Including handling of the board, regulator, IT issues, PR concerns and much more in order to improve under-fire decision making.