dreamstimeextralarge_41579943

Documentation, Policies and Procedures Assessment

  • Physical security
  • Business Continuity/Disaster recovery
    • Policy Review
    • Test results review
    • Procedure review
  • Vendor Management
  • Risk assessment and treatment
  • Security training and awareness
  • Security Incident Escalation
  • HR policies & procedures (background checks, new hire & termination)
  • Employee handbook
  • Information Security
  • Network topology review
  • Password (domain & mobile device including smartphone/tablets)
  • Antivirus/Malware
  • Teleworking/Mobile computing
  • Acceptable Use
  • Remote Access
  • Software Development Life Cycle
  • Application delivery
  • Business Process
  • Systems hardening documentation review
  • Privacy
  • Change control
  • Access Control

OwnIt Consulting – we help companies assess their skills and choose a new direction which utilizes the talents of the team and resources most productively.

how can we help you?

Please submit a business inquiry online.

Our clients depend upon the results we are privileged to produce for them. Wayne Miller has contributed directly to these results, helping us honor critical commitments.

candh
Ken Peterson
Founder & CEO, Churchill & Harriman

Looking for a First-Class Network Security Consultant?