CYBERSECURITY CONSULTING

Governance

Intuitus Cybersecurity Consulting provides customers with the information they need to develop a cohesive security posture. If you do not see the service you need, talk to us.

We offer custom consulting as well.

 

Cybersecurity Policies

Organizations should adopt Cybersecurity Policies that comprise of industry standard best practices. Intuitus can tailor Cybersecurity Policies to the unique needs of your organizations.  Policies may include Acceptable Use, Password, Data Protection, Remote Access, and more. (Cyber) Security Policies are often a requirement for industry compliance or certifications necessary for government contracts. 

Cybersecurity Assessment

Cybersecurity threats exploit the increased complexity and connectivity of infrastructure systems, placing businesses security, economic health, and safety at risk. Cyber threats can drive up costs and affect revenue. They can harm an organization’s ability to innovate. Intuitus Cybersecurity Assessments analyze People, Processes, and Technology so organizations can comprehensively mitigate vulnerabilities. 

An intuitus Cybersecurity Assessment includes a Vulnerability Assessment or an internal Penetration Test to assess technical vulnerabilities. Intuitus then leverages the NIST Cybersecurity Framework or other desired assessment guidelines (e.g., ISO 27001 SCF, NENA NG-SEC Checklist, SPRS score, etc.) to assess People and Processes. These recognized guidelines provide standardization as well as aid in meeting regulatory compliance requirements. 

Cybersecurity Framework

Don’t know what you need to do to have good cyber hygiene? Do you need an assessment of your organization’s cybersecurity and a plan to mitigate security gaps? You need a Cybersecurity Framework.  A Cybersecurity Framework will assess your organization’s current cybersecurity posture and will outline a plan to get to a Target Profile. The Target Profile may be of your own designation, or it might be from an existing assessment guideline (e.g., NIST CSF, ISO 27001 SCF, NENA NG-SEC Checklist, SPRS score, etc.) A Cybersecurity Framework includes Cybersecurity Policies and an Incident Response Action Plan. A Cybersecurity Framework often satisfies multiple compliance requirements. 
Do I need a Cybersecurity Assessment or a Cybersecurity Framework?
Both utilize recognized guidelines to access your organization’s cyber posture. However, the cybersecurity Assessment includes a technical assessment to reveal the impactful vulnerabilities in your network environment and quickly spot priority exposures with a high likelihood of attack and business impact. The Cybersecurity Framework does not include the technical assessment but does include a gap-analysis of your cybersecurity posture, a “roadmap” to resolve or mitigate shortfalls, Cybersecurity Policies, and an Incident Response Action Plan.