Countries
Revenue (2018)
Employees
Branches & Business
A top-down approach was leveraged to assess business risks of a cyber event by identifying top threats and loss event scenarios Non-Public information (NPI) usage at the organization was then recorded. This was followed by reviewing applicable cybersecurity controls for design and operating effectiveness to determine the path of remediation initiatives required to fulfill regulatory requirements and reach the client’s target risk profile.
An enterprise-wide cybersecurity program was built out to align with industry leading practices and frameworks and increased the client’s cyber resilience through enhancements in management oversight, operational processes and technology.