We will work with you over the course of a morning or an afternoon to give you an overall understanding of where you stand regarding security and privacy. We will develop plans to address the shortcomings and techniques to take advantage of your strengths.
Level 1 – Half-Day Security and Privacy Consultation
Service features & benefits
Consulting Package Level 1 – Half-Day Security and Privacy Consultation ($950)
CyberScout will deliver to the Customer a general understanding of the state of their security and privacy practices along with recommendations on how to mitigate risks that exist. The intent is to help the Customer eliminate privacy and security risk. CyberScout will conduct a 3- hour review, provide written documentation, and a 1-hour review call.
The listed fees do not include travel costs. If onsite travel is required, the Customer will also be responsible for reasonable travel costs incurred by CyberScout. If the scope is expanded, additional fees of $250/hour may be incurred.
CyberScout Consulting delivers to Cybershield Global’s (CSG’s) members a general understanding of the state of their security and privacy practices along with recommendations on how to mitigate risks that exist. The intent is to help the member eliminate privacy and security risk as part of the services that CSG is offering, potentially reducing risk for CSG in the process.
This engagement will include the existing processes and procedures, whether they are documented or not, for each CyberShield Global member. Only information shared through meeting with personnel from the member organization will be included in this review, but that information will cover the processes, the technology, and the organizational controls at the member organization.
CyberScout will arrange a meeting, either in person or via WebEx, with key personnel from the member organization. We will then deliver a detailed agenda to the member, including details about what information we will be asking for.
During the discussion, CyberScout will lead a facilitated session that will review:
- Perimeter network security
- Practices for user management
- Practices for access control
- Data classification and management
- User education
- Roles and Responsibilities
- Policies and Procedures
- Practices for risk assessment and vulnerability management
- Processes for controlling security risks presented by third-parties
- Breach and Incident Response procedure
After gathering information on these areas, we will identify the risk inherent in the member’s enterprise and summarize those risks, along with recommendations on how to alleviate the risks, in a brief report.
Written report delivered 1-2 weeks from discussion. Follow-up phone call to discuss report