COMMERCIAL

man-with-laptop

Protect Your Business With Enterprise Governance

Cybersecurity and Risk Management: NIST-RMF, NIST CSF and FedRAMP

Cybersecurity National Action Plan (CNAP)

High Value Asset (HVA) Identification

Breach Preparedness Programs

We Seek To Align Cyber Security With the Business Process

Strategic Alignment

Risk Management

Resource Management

Value Delivery

Performance Measurement

Data Governance

Enterprise Data Management

Data Stewardship / Data Owner

Data Governance Methodology

CRG methods for data governance assists business in locating sensitive data, determining the risk level of the data, and the data owners to determine a risk-based and cost-effective protection solution.

Vulnerability Management

Vulnerability Scanning

Scan Data Management

Remediation Efforts

This is the first step in the security pathway. Without this, a business has no visibility into exposure and no data for risk analysis. A basic vulnerability management program done well can eliminate many issues before they become real risk problems for the business.

Phishing

Phishing Campaigns

Phishing Training

CRG can conduct both phishing campaigns and provide the added value of using material from the campaign in follow-up training. CRG can come on-site to conduct multiple sessions for larger work forces or conduct the training via web conference.

Many compliance frameworks require at least annual penetration testing.  CRG engineers will conduct the penetration test following the industry standard steps:

Planning (includes Rules of Engagement, Times, and ensuring the final report will detail the items needed by the company)

Reconnaissance

Vulnerability Analysis

Exploitation

Post Exploitation (According to RoE)

Reporting

Final Debriefs

Through our international work, extending from EU to Latin America, CRG can support the international and multi-national requirements from Article 5 of GDPR:

  • (a)

    processed lawfully, fairly and in a transparent manner in relation to individuals (‘lawfulness, fairness and transparency’);

  • (b)

    collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes; further processing for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes shall not be considered to be incompatible with the initial purposes (‘purpose limitation’);

  • (c)

    adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed (‘data minimisation’);

  • (d)

    accurate and, where necessary, kept up to date; every reasonable step must be taken to ensure that personal data that are inaccurate, having regard to the purposes for which they are processed, are erased or rectified without delay (‘accuracy’);

  • (e)

    kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the personal data are processed; personal data may be stored for longer periods insofar as the personal data will be processed solely for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes subject to implementation of the appropriate technical and organisational measures required by the GDPR in order to safeguard the rights and freedoms of individuals (‘storage limitation’);

  • (f)

    processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures (‘integrity and confidentiality’)

The controller shall be responsible for, and be able to demonstrate compliance with, paragraph 1 (‘accountability’)

Book a Consultation

Take the first step in securing your business’s information. Fill out our contact form to set an appointment.