Enterprise Client
The Challenge
Our client was not clear what their most sensitive data was. We worked to locate and identify the current protections.
Our Solution
Helped define data classification criteria and well as defining a 'crown jewel' (what is the most important information to an organization).
Conducted a review of where the data is stored, processed and transmitted.
Reviewed existing policy and standards to determine potential control gaps in requirements for these types of systems.
Conducted an assessment and identified areas of opportunity as well as recommendations for the previously identified crown jewels.
Business Impact
Improved response times for existing and new vendors who support the organization and products.
Additional Details
Containment alone takes an average of 32 hours once an incident has been detected and investigated. The survey also reveals that this lack of cybersecurity readiness is widespread, with 95% of respondents claiming that can't get near the 1-10-60 time frame.
Source: 2019.11.19 | Crowdstrike