COMMERCIAL
Protect Your Business With Enterprise Governance
Cybersecurity and Risk Management: NIST-RMF, NIST CSF and FedRAMP
Cybersecurity National Action Plan (CNAP)
High Value Asset (HVA) Identification
Breach Preparedness Programs
We Seek To Align Cyber Security With the Business Process
Strategic Alignment
Risk Management
Resource Management
Value Delivery
Performance Measurement
Data Governance
Enterprise Data Management
Data Stewardship / Data Owner
Data Governance Methodology
CRG methods for data governance assists business in locating sensitive data, determining the risk level of the data, and the data owners to determine a risk-based and cost-effective protection solution.
Vulnerability Management
Vulnerability Scanning
Scan Data Management
Remediation Efforts
This is the first step in the security pathway. Without this, a business has no visibility into exposure and no data for risk analysis. A basic vulnerability management program done well can eliminate many issues before they become real risk problems for the business.
Phishing
Phishing Campaigns
Phishing Training
CRG can conduct both phishing campaigns and provide the added value of using material from the campaign in follow-up training. CRG can come on-site to conduct multiple sessions for larger work forces or conduct the training via web conference.
Many compliance frameworks require at least annual penetration testing. CRG engineers will conduct the penetration test following the industry standard steps:
Planning (includes Rules of Engagement, Times, and ensuring the final report will detail the items needed by the company)
Reconnaissance
Vulnerability Analysis
Exploitation
Post Exploitation (According to RoE)
Reporting
Final Debriefs
Through our international work, extending from EU to Latin America, CRG can support the international and multi-national requirements from Article 5 of GDPR:
- (a)
processed lawfully, fairly and in a transparent manner in relation to individuals (‘lawfulness, fairness and transparency’);
- (b)
collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes; further processing for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes shall not be considered to be incompatible with the initial purposes (‘purpose limitation’);
- (c)
adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed (‘data minimisation’);
- (d)
accurate and, where necessary, kept up to date; every reasonable step must be taken to ensure that personal data that are inaccurate, having regard to the purposes for which they are processed, are erased or rectified without delay (‘accuracy’);
- (e)
kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the personal data are processed; personal data may be stored for longer periods insofar as the personal data will be processed solely for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes subject to implementation of the appropriate technical and organisational measures required by the GDPR in order to safeguard the rights and freedoms of individuals (‘storage limitation’);
- (f)
processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures (‘integrity and confidentiality’)
The controller shall be responsible for, and be able to demonstrate compliance with, paragraph 1 (‘accountability’)
Book a Consultation
Take the first step in securing your business’s information. Fill out our contact form to set an appointment.