Enterprise Client

The Challenge

Our client was not clear what their most sensitive data was. We worked to locate and identify the current protections.

Our Solution

  • Helped define data classification criteria and well as defining a 'crown jewel' (what is the most important information to an organization)​.

  • Conducted a review of where the data is stored, processed and transmitted​.

  • Reviewed existing policy and standards to determine potential control gaps in requirements for these types of systems​.​

  • Conducted an assessment and identified areas of opportunity as well as recommendations for the previously identified crown jewels.

Business Impact

  • Improved response times for existing and new vendors who support the organization and products.

Additional Details

Containment alone takes an average of 32 hours once an incident has been detected and investigated. The survey also reveals that this lack of cybersecurity readiness is widespread, with 95% of respondents claiming that can't get near the 1-10-60 time frame.

Source: 2019.11.19 | Crowdstrike

image.jpg
Next
Next

Enterprise Client