top of page

Why Technology Assurance and Advisory?

Build Value by managing financial, technology and business risks Intelligently

Our TOGAF certified resources assist you in analyzing the relationships and dependencies between the various components of IT security architecture and the way they interact with your infrastructure, application development and necessary management. 

What do we cover?

Recent technology trends, development standards, emerging technologies, security threats and unknowns challenge the organizations at every step. Even if organizations have a financial and operational bandwidth to handle this, unless otherwise needed, it is always advisable to have an outside or 3rd advisory to be part of the risk management team to understand the challenges in the industry, how their competitors handle it.  

​

Further our comprehensive standards-based security programs enable organizations to evaluate their security in accordance with the Federal Information Security Management Act (FISMA) and defined in the five-level Security Assessment Framework (SAF). We also support compliance with regulatory requirements in the commercial sector such as GLBA, HIPAA, Sarbanes-Oxley, international standards such as ISO-17799, and industry best practices.

​

We use standards and controls applicable to your privacy and security posture including:

​​

  • HIPAA/HITECH Security, Privacy and Breach Notification Rules

  • Generally Accepted Privacy Principles (GAPP)

  • EU’s General Data Protection Regulation (GDPR)

  • ISO/IEC 27001-2:2013

  • CIS Top 20 Critical Security Controls (CA AG requires)

  • SEC OCIE Cybersecurity Initiative

  • NIST Cybersecurity Framework

​

​

bottom of page