Enterprise Information Security Program Review & Consultation

PRIMARY CONTACT: Carl N. Kriebel CISSP

In today’s IT environment risk and threats to your company can come from anywhere, internal (disgruntled employees, vendors, contractors), or external (organized crime, competitors, protesters, nation states). It is crucial that you identify your digital assets (PCI, PII, PHI, Banking, Marketing, Customer, Payroll, AP, AR, W2, Test, Back Ups, Paper, etc.), the threats to those assets, and the controls you have protecting the confidentiality, availability and integrity of those assets. Schneider Downs offers this type of security review and consultation to help protect your data.

With this review, Schneider Downs seasoned professionals can also assist in defining strategies and developing policies and procedures customized for your business environment. We can build or assist with creating programs for security awareness and information security compliance. In addition, we can share our experiences as to which products or vendor security services may best meet your needs.

  • Interview network administrators and third-party vendors and conduct network search for sensitive or critical data and systems
  • Conduct network security reviews and scans, review security policies, procedures, and logs
  • Review findings with security and management to reach consensus
  • Issue report with as needed threats, risks, gaps, recommendations, strategies, policies, or procedures

View our additional IT Risk Advisory services and capabilities

Breached?

Every moment counts. For urgent requests, contact the Schneider Downs digital forensics and incident response team at 1-800-993-8937. For all other requests, please complete the form below.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.