Your browser version is outdated. We recommend that you update your browser to the latest version.

 


IT Security Gap Assessment

We can perform a gap assessment against existing policies, standards and procedures or against a pre-defined set of industry best practices.


 Approach:

The consultant will work with the client to determine the scope of the assessment including any existing security policies etc. that should be used to determine what, if any gaps due to non-conformance may exist. A set of industry best practices will be identified for consideration and used as the baseline security controls for the detailed assessment.

Expected Outcome:

Our clients will receive a detailed report describing the methodology, approach, scope tec. along with the expected practices and any deficiencies noted. The Report will also provide a list of recommendations for general overall improvements in security within the organization; however, the Report may not highlight specific risks unless specified at the outset (see IT Security Assessment if this is the case).

Learn More.....