- Home
- |
- About
- |
- Services
- |
- Security Operations Centre
- |
- Integrated Approach
- |
- Careers
- |
- News
- |
- Contact
In today's world of increasing cyber security threats, how a company manages other forms of information is often less scrutinized. Not only will this section of the assessment examine the client's information security program to ID where specific vulnerabilities exist, it will provide the assessment team with a view into how the company is committed to securing information on a day-to-day basis through policy, practice and oversight.
A detailed review will be conducted to identify what information is collected via paper, data storage devices, or other non-electronic means from clients, partners and stakeholders.
Following this, focus will be centred on examining the policies and practices in place to securely process this information.
Finally, attention will also be paid to how the organization coordinates sensitive meetings, teleconferences and other verbal conversations. This information will be collected through interviews with key staff / mgmt., reviewing company practices and other observational methods.
It is important to the data gathering process that the appropriate management and other accountable representatives attend the data gathering meetings to ensure the required information to support an effective analysis is collected. It is recognized that certain client representatives may have multiple responsibilities and terminology for positions may vary, therefore, it is critical to make prior preparations with the Project Lead during the Introduction meeting to ensure representatives with the following accountably attend this meeting:
Kenaston P.O. Box 70010
Winnipeg, Manitoba, Canada, R3P 0X6
x 204-202-5050 A info@castellaninformationsecurity.com