RISK MANAGEMENT

  1. Third Party Risk Assessments.
  2. Board and Executive Risk Reporting.
  3. Calculate the Cost of a Data Breach.
  4. Calculate the Risk of a Data Breach.
  5. Mitigate Data Breach Vulnerabilities.
  6. Access Granting Review (Need to Know, Share for Collaboration).
  7. Draft or Review Risk and Compliance Policy and Procedures.
  8. Job Rotation / Forced Retirement Review.
  9. Behavioral Monitoring Advisory.
  10. E-Discovery Assistance / Evidence Chain of Custody Review.
  11. Supply Chain Risk Assessment.
  12. Calculate Likely Threats.
  13. Calculate Likely Attack Types.
  14. Calculate How Much Disruption An Organization Could Take.
  15. Conduct the BIA (Business Impact Analysis).
  16. Calculate RPO (Recovery Point Objective): the interval of time that may pass during a disruption before the quantity of data lost during that period exceeds the Business Continuity Plan’s maximum.
  17. Calculate RTO (Recovery Time Objective):
    The time limit you set for recovery and restoration of any part of your business after a disaster.
  18. Evaluate Effectiveness of Security Tools.