Silver – Retainer Based Services

Tactical Services –


  1. Security team optimization
    1. Is your existing team performing in an efficient and effective manner? Are there areas where things could be improved?
  2. Privacy data handling process review
    1. How is the company defining, identifying, and protecting Personally Identifiable Information (PII) or Personal Health Information (PHI)?
    2. Are current standards and requirements being met?
  3. Incident response plan review
    1. Verify that existing plan can address current threats and risks effectively
  4. Identity and access management, policy and process review
    1. Are you mandating, implementing, enforcing, and reporting adequate Identity Access Management across the enterprise? Is there a documented and repeatable process in place for success?
  5. Review of risks management standards and processes
    1. Do standards and processes align with the understood risk acceptability criteria of Senior Management?
  6. Continuous monitoring planning
    1. Develop a scalable and thorough process for maintaining a robust security posture for the enterprise throughout the entire Life Cycle of the systems
  7. Website scans
    1. Vulnerability scanning of public facing websites
  8. Vulnerability scans across all enterprises
    1. Internal scanning performed on a recurring basis
  9. Vulnerability scans of internet facing services
    1. External scanning performed on a recurring basis
  10. Security configuration reviews
    1. Review architecture, system configurations, segmentation, and align with current best practices or standards
  11. Compliance audit (ISO, PCI, HIPAA, NIST, FedRAMP, SOC)
  12. Vulnerability remediation validation
    1. After vulnerability mitigation plan is followed, we will retest system via vulnerability scans

if you’re interested in learning more about our Cyber Security Services you can contact Stanley Goldman by email at Stanley Goldman or 201.573.0400 Ext.14

Share Button