CIO On DemandCIO On Demand
The senior management team recognized that the Information Technology group was fragmented and understaffed in comparison to other firms of their size.  However, not being a technology focused organization with no inclination to become one, they sought a strategic partner to help them navigate a myriad of common issues
Download 

 

Compliance Readiness

Compliance Readiness
A major service provider in the production of web based storefronts considered how they might meet the rigorous requirements of the Payment Card Industry (PCI) as a Service Provider with little or no in-house knowledge of the industry standard and minimal budget.
Download

 

Securing The UniversitySecuring The University
Universities have been targets for computer hacking since computers first arrived on campuses.  Universities have a unique challenge in protecting their digital assets.  One challenge facing universities is a large number of hackers reside on the university network.
Download

 

Infrastructure RemediationInfrastructure Remediation
The management team recently turned its attention on determining how to perform comprehensive vulnerability management given the size of their IT infrastructure.  Meeting industry and regulatory compliance requirements was their #1 priority.
Download

 

Vulnerability_ManagementVulnerability Management
The management team at the largest integrated healthcare network recently turned its attention on determining how to perform comprehensive vulnerability management given the size of their Internet facing infrastructure.  Meeting industry and regulatory compliance requirements was a top priority.
Download

 

Security Acrhitecture ReviewSecurity Architecture Review
Technology has augmented the accessibility provided by all corporations.  The largest technology media company in the world is no exception. Vulnerability and penetration testing helped uncover that systemic flaws needed to be addressed before making themselves present in the environment.
Download

 

Application Penetration TestingApplication Penetration Testing
One of the premier certified public accounting and advisory firms in the country turned its attention to determining how to assess the protective controls around their Internet-based information and customer portal. Meeting industry and regulatory compliance requirements was a top priority.
Download