Security & Risk Management
Image

ANALYZE RISKS, DEFINE SECURITY REQUIREMENTS, ENSURE COMPLIANCE


Take a holistic risk-based approach to information security management that protects against cybersecurity threats and aligns with your business strategies.

By properly defining risks and adopting a risk-based security framework, we implement security programs across the enterprise to ensure compliance across your systems, employees, and third-party vendors.


Image

Cybersecurity stakes have never been higher. Cloud introduces new security patterns and approaches. Also, regulatory agencies demand compliance on regulations regarding technology risk, customer data, and more.

Our experts work with clients to build a Risk Management Program that enables the organization to minimize risks and make both strategic and tactical decisions.

TECHNOLOGIES
Frameworks
  • NIST 800
  • ISO 27000
  • NIST CSF
  • COBIT
  • ITIL

Compliance
  • GLBA
  • GDPR
  • CCPA
  • COV SEC501
  • COV SEC525
  • HIPAA
  • FFIEC
  • PCI DSS

Governing Bodies
  • HHS (HIPAA)
  • OCC (FFIEC)
  • FINRA

SECURITY & RISK MANAGEMENT: OUR THINKING




Mitigate IT Risk & Accelerate IT Maturity in Local Governments with Impact Makers

  • Public Sector
    /
  • Risk
    /

From improved access to resources to creating job opportunities, transforming data management for charitable nonprofit can have a far-reaching impact....



The Realities of Ransomware. Prevent, Protect, Prepare.

  • Advisory / Strategy
    /
  • Public Sector
    /
  • Risk
    /

Over the past year, there have been several high-profile ransomware attacks in which the target paid the ransom.  In May, Colonial Pipeline was hacked with ransomware by DarkSide.  This left...



The Current State of Cloud Security

  • Advisory / Strategy
    /
  • Data & Analytics
    /
  • Risk
    /

By: Herman Boma, Lead Architect, Impact Makers In the Summer of 2021, Herman Boma, Lead Cloud & Big Data Architect at Impact Makers, was interviewed by OpsCompass to discuss the...



APIs for Sharing Healthcare Data

  • Automation
    /
  • Data & Analytics
    /
  • Featured
    /
  • Healthcare
    /
  • Interoperability
    /

This is the second post in a series about sharing healthcare data according to new CMS guidelines. The first post covers New Solutions for Sharing Healthcare Data WHY IS THE...



New Solutions for Sharing Healthcare Data

  • Advisory / Strategy
    /
  • Featured
    /
  • Healthcare
    /
  • Interoperability
    /

Why would providers, payers, and consumers share Healthcare data?  Healthcare as an industry has been slow to implement data sharing across payers, providers and patients.  Impediments to data sharing have traditionally included regulations (i.e. HIPAA) as well as the use of closed system architectures.  However, current industry forces are changing...



Facial Recognition: Does the “Public Domain” Equal “Fair Game”?

  • Advisory / Strategy
    /
  • Risk
    /

I would like to preface this article with a disclaimer: I am not now, nor have I ever been, nor am I likely to ever be a lawyer. I haven’t...



Leveraging SOC Reports

  • Risk
    /

We have been discussing System and Organization Controls (SOC) reports and how they can be a used to establish and maintain trust between service providers and their customers.  In our...



Decoding SOC Reports

  • Risk
    /

As noted in our earlier blog, System and Organization Controls (SOC) can be helpful tool in establishing and maintaining trust between service providers and their customers. Yet there are still...



Demystifying SOC Reports to Build Trust and Reduce Risk

  • Risk
    /

The rise in cloud-based technology and third-party solutions increases both the complexity and uncertainty of security and compliance responsibilities. Service providers and their customers need to understand how responsibilities are...



How can a Hybrid Cloud Monitoring Solution help my team monitor the cloud?

  • Advisory / Strategy
    /
  • Data & Analytics
    /

There are hundreds of monitoring products in the marketplace that cover monitoring from enterprise scale to small and medium businesses. How can a monitoring system help your team? It is...



GDPR is Here! What is it and How Does it Affect Your Compliance Management Program?

  • Healthcare
    /
  • Risk
    /

If you’ve been a privacy professional at any point in the last few decades, your head is spinning with the myriad of privacy laws and regulations in the U.S. and...



InfoSec Can Be Taxing, So Here’s a Taxonomy

  • Advisory / Strategy
    /
  • Risk
    /

Information Security can sometimes feel like death by documentation, like a bunch of red tape just to keep regulators and auditors at bay. Throw in differences in lexicon, and seeing...


    WANT TO IMPROVE YOUR SECURITY POSTURE?


    Lets Get Started!