- Third Party Risk Assessments.
- Board and Executive Risk Reporting.
- Calculate the Cost of a Data Breach.
- Calculate the Risk of a Data Breach.
- Mitigate Data Breach Vulnerabilities.
- Access Granting Review (Need to Know, Share for Collaboration).
- Draft or Review Risk and Compliance Policy and Procedures.
- Job Rotation / Forced Retirement Review.
- Behavioral Monitoring Advisory.
- E-Discovery Assistance / Evidence Chain of Custody Review.
- Supply Chain Risk Assessment.
- Calculate Likely Threats.
- Calculate Likely Attack Types.
- Calculate How Much Disruption An Organization Could Take.
- Conduct the BIA (Business Impact Analysis).
- Calculate RPO (Recovery Point Objective): the interval of time that may pass during a disruption before the quantity of data lost during that period exceeds the Business Continuity Plan’s maximum.
- Calculate RTO (Recovery Time Objective):
The time limit you set for recovery and restoration of any part of your business after a disaster. - Evaluate Effectiveness of Security Tools.
| |