• Cybersecurity & Risk Management: NIST-RMF, NIST CSF & FedRAMP
  • Cybersecurity National Action Plan (CNAP)
  • High Value Asset (HVA) Identification
  • Breach Preparedness Programs

CRG Security Principals seek to align cybersecurity to the business process:

  • Strategic alignment
  • Risk management
  • Resource management
  • Value delivery
  • Performance measurement
  • Enterprise Data Management
  • Data Stewardship / Data Owner
  • Data Governance Methodology

CRG methods for Data Governance assists business in locating sensitive data, determining risk level of the data, the data owners, and the data owners to determine a risk-based / cost-effective access and protection solution.

  • Vulnerability Scanning
  • Scan Data Management
  • Remediation Efforts

The first step in the security pathway.  Without this, a business has no visibility into exposure and no data for risk analysis.

A basic vulnerability management program well done can eliminate many issues before they become real risk problems for the business.

  • Phishing Campaigns
  • Phishing Training

CRG can conduct both phishing campaigns and provide the value-add of using the material from the campaign in follow on training.  CRG can come on-site to conduct multiple sessions for larger work forces or conduct the training via web conference for work forces widely spread.

 

Many compliance frameworks require at least annual penetration testing.  CRG engineers will conduct the penetration test following the industry standard steps

  • Planning – including Rules of Engagement, Times and ensuring the final report will detail the items needed by the company
  • Reconnaissance
  • Vulnerability Analysis
  • Exploitation
  • Post Exploitation (According to RoE)
  • Reporting
  • Final debrief

 

Through our international work, extending from EU to Latin America, CRG can support international and multi-national requirements

From Article 5 of GDPR:

(a) processed lawfully, fairly and in a transparent manner in relation to individuals (‘lawfulness, fairness and transparency’);

(b) collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes; further processing for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes shall not be considered to be incompatible with the initial purposes (‘purpose limitation’);

(c) adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed (‘data minimisation’);

(d) accurate and, where necessary, kept up to date; every reasonable step must be taken to ensure that personal data that are inaccurate, having regard to the purposes for which they are processed, are erased or rectified without delay (‘accuracy’);

(e) kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the personal data are processed; personal data may be stored for longer periods insofar as the personal data will be processed solely for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes subject to implementation of the appropriate technical and organisational measures required by the GDPR in order to safeguard the rights and freedoms of individuals (‘storage limitation’);

(f) processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures (‘integrity and confidentiality’)

 

The controller shall be responsible for, and be able to demonstrate compliance with, paragraph 1 (‘accountability’)