- Date: February 26, 2016
- Posted by Litcom Team
- No Comments
- Category: Information Security Program Development
|
608,182,054 The total number of records containing sensitive personal information involved in 3,785 data breaches made public since 2005. |
Source: A Chronology of Data Breaches, Privacy Rights Clearinghouse, June 2013.
|
600,000 The number of estimated Facebook accounts being compromised every day. |
Source: http://www.go-gulf.com/blog/cyber-crime
To help organizations address the growing challenges of cybercrime and data breaches, Litcom has developed an innovative Information Security Health Check assessment. Contrary to common assessments that focus only on specific technologies or processes, Litcom’s Information Security Health Check includes the holistic evaluation of all critical elements of the client’s information security practices. This evaluation includes:
Strategic Alignment
Are you missing the opportunity to leverage emerging technologies such as cloud computing, bring your own device, or social media due to the lack of confidence in your security function?
Security Management and Governance
Is an information security organization and governance framework defined to enable execution of the organization’s information security strategy?
Security Operations
Are the required processes in place?
Privacy and Compliance
Is compliance achieved in a cost effective matter?
Technical Architecture
Are the organization’s systems secure and are their security tools effectively utilized?
Litcom’s Overview of Information Security Health Check Approach
Please contact Litcom for more information.
Written by Kees Pouw, Litcom Senior Associate.
What is your organization’s data breach protection plan?
Today’s networks are very complex and diversified environments with multiple points of entry that a malicious attacker can use to gain access to the network and ultimately the data residing there. Download our free guide: Cyber Security, Cloud computing Attacks and Defences to learn the steps your organization should take to avoid a future breach.
Download Guide
What is your organization’s data breach protection plan?
Today’s networks are very complex and diversified environments with multiple points of entry that a malicious attacker can use to gain access to the network and ultimately the data residing there. Download our free guide: Cyber Security, Cloud computing Attacks and Defences to learn the steps your organization should take to avoid a future breach.
Download GuideNews Categories
- Business Analysis
- Data Visualization
- Enterprise Security
- ERP Optimization
- Information Security Health Check
- Information Security Program Development
- IT Assessment
- IT Management
- IT Staff Augmentation
- IT Strategy
- Merger & Acquisition Due Diligence
- PCI Compliance
- Post Merger Integration
- Procurement Process Improvement
- Project Management
- Threat Risk Assessment & Penetration Testing
- Vendor Selection
Archives
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- August 2014
- July 2014
- June 2014
- May 2014
- March 2014
- February 2014
- October 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- June 2011
- May 2011
Stay Connected
265 Rimrock Rd., Suite 202
Toronto, Ontario M3J 3C6
phone: 905 763 8900
fax: 905 763 8233
email: info@litcom.ca
Recent Posts
- Information Security Health Check: Know the Unknowns and Manage Risk
- Business Analysis: An Important Discipline in any IT project
- 7 Tips for Project Management Success
Reference Links
- About Us
- Services
- Grow with us
- Contact Us
IT Assessments
- IT Assessment
- Assessing the Value of IT in your Organization
- How can your organization benefit from an IT assessment?
- Conducting an IT Assessment