top of page

Cybersecurity and Privacy Risk Management

- Security Program Development

- Risk Assessment & Management

- Compliance & Regulatory Alignment

- Incident Response Planning 

- Security Policies Development

- Security & SDLC Training 

- Third-Party Vendor Management 

- Business Continuity Management 

- Security Technology Implementation

- AWS, GCP & Azure Security  Planning

- Cybersecurity Insurance Decisions

- Customer Security Questionnaires 

-M&A Cybersecurity Assessment 

Quarterly Technical Security Managment

- Port Scanning for Backdoors

- Website Vulnerability (for >70 Issues) 

- Network Vulnerability (for>10K CVEs)

- SSL/TLS Vulnerability Scanner

- Website Reconnaissance

- Shadow IT Subdomain Discovery

- Data Privacy Mapping 

- SSO Access Control Reviews

- Firewall Security Rule Reviews

- Endpoint Security Verification

- Red Teaming Exercise

Regulatory & Complaiance Program Management

- SSAE 18 (SOC 1, SOC 2, SOC 3)

- PCI DSS Level 1, 2, 3 and 4 

- California Consumer Privacy Act 

- Sarbanes-Oxley Act (SOX) Section 404

- ISO/IEC 27001 Certification 

- General Data Protection Regulation

- Algorithm Risk & Impact Assessment

- Data Privacy Impact Assessment 

- NYC 144 Bias Audit

- EU AI Act Conformity Assessment 

- ISO/IEC 42001 Certification

- EU Digital Services Act Audit

- EEOC AI Bias Audit

bottom of page