Cyber Security and Information Security
- Virtually all IT risk and audit engagements encompass an element of information security. Numerous assessments of information security practices, policies and procedures and configuration of the various aspects of the IT environment have been performed.
- Technology platforms assessed have included AS/400/iSeries, Windows, OS/390 (Top Secret and RACF), UNIX variants, Oracle database, SQL database, SAP, Oracle Financials, JD Edwards and various other 2nd tier and in-house developed applications.
- Network environments audited include network segmentation design and implementation and the various systems and services in use to protect the perimeter and network traffic including firewalls, routers and switches, IDS/IPS, DLP, event management systems, VPN, MPLS
- Three projects are described in detail below:
|
Client: |
FX trading company |
|
Duration: |
4 months |
|
Key Roles/ Services Performed: |
Project manager/Assessment |
|
Details: |
|
|
Benefits to client: |
Through the formal approach taken to asset valuation, threat determination and impact assessment, vulnerabilities were able to be identified and ranked according to their overall risk. This allows vulnerabilities of greater risk to be targeted for earlier remediation, and for closer monitoring for the effectiveness of the associated safeguard. |
|
Client: |
Credit union |
|
Duration: |
4 months |
|
Key Roles/ Services Performed: |
Project manager/Assessment |
|
Details: |
|
|
Benefits to client: |
Our client and the outsourced service provider received a report that outlined areas for improvement and recommendations for addressing these areas. The report was able to be provided to the industry regulator who required an external assessment be performed prior to go-live operations. |
|
Client: |
Major telecommunications and media company |
|
Duration: |
6 months |
|
Key Roles/ Services Performed: |
IT auditor |
|
Details: |
|
|
Benefits to client: |
With a baseline audit program, team members were able to hit the ground running with their respective areas. Client received a comprehensive report on areas of improvement and an objective, independent assessment of the true state of control practices for the in-scope areas. |