Virtual CISO

Central figure for Cyber Security in your organization

UnderDefense demonstrated a high level of professionalism during the security services engagement; the project was a major factor in securing our security posture, therefore we chose to proceed with further cooperation with UnderDefense by utilizing their vCISO Services.

Eugene Vyborov

CTO, YayPay

At UnderDefense we understand that for those without a dedicated security team it can be difficult to know where to start when assessing cybersecurity program. For this reason, we offer vCISO as a Service as well as our deep insights and knowledge into how security operations should be developed, implemented, run, and managed.

Get a free consultation with our vCISO

Your Security from A to Z

By starting with a Security Assessment we are able to define all the critical areas an organization needs to improve on. Once the gaps have been exposed we work with you to resolve these issues through a process of product and strategy recommendations, compliance and regulatory guidance, support for strategic business objectives, alliance with existing policies and processes, and/or the technical requirements of your existing IT infrastructure.
DETAILS:
durationfrom 12 weeks up to 1 year contract (dependent on conducted roadmap and requirements)
value:
  • trusted expirienced security advisors
  • one-on-one security consultation
  • successful growth of your business
  • better cybersecurity posture
  • lower costs let small and medium businesses implement security operations
  • cover a full spectrum of your organization’s security services needs
output:
  • Executive function individuals guiding all Security Operations activities
  • Coordinating, communicating, and reporting on all aspects of Information Security activities
  • Remediation recommendations and technical references and trainings
  • Presentation and demo that represents activities that were accomplished
  • Flexible Retainer Agreements
applicable:
  • Small and medium businesses
  • Enterprises
  • Retail companies
  • Financial institutions
  • Investment firms
  • Insurance groups
  • Healthcare

Our Security Advisory Program is deployed in the following format:

Security Assessment

Security Operations Development

Security Talent Allocation/Training

Threat Modeling

What our Virtual CISO will do for you:

– Information security leadership – Guidelines & Best Practices – Governance and Compliance – Security Point-of-Contact for All Issues – Steering committee leadership or participation (engaging the client/management/board) – Security policy, process, and procedure development – Incident response planning – Security training and awareness – Planning Security assessment – Planning Penetration testing – Planning Social engineering – Analyze results of Vulnerability assessments – Risk assessment – Conduct initial planning, such as establishing timelines, document scope and confirming your objectives – Conduct an initial IT security audit and Gap analysis – Determining level of acceptable risk, identifying critical assets – Aligning your business strategy with IT security policies – Conduct regular and thorough information gathering sessions – Define and develop key IT security policy components – Remote Access policies and process – Third-Party security controls – Security operations processes – Identity & Access Management – Personnel Security and Training – Security architecture and design

The deliverables for the vCISO:

– Presentation of the recommended security strategy & roadmap – A chronological roadmap depicting projects and priority – High level cost estimates for budgetary purposes – Answers to any and all questions to ensure successful knowledge transfer – Communicating business risks, threat scenarios and estimating impact for critical security events with top management – Documentation discussing identified projects outlining why they are important, and possible consequences if they are not executed – Assistance with putting a plan on the company’s calendar – Project planning and execution, identifying suitable third party support and setting up requirements for a successful completion – Testing implemented policies and procedures actively through practicing them within the organization and continuously optimizing efficiency – Developing metrics for the organization to evaluate improvements and security progress throughout time – Conducting security awareness testing and training programs and running continuous assessments to identify weakest links within the organization

Pin It on Pinterest