vCIO & vCISO
As an organization embarks on several essential and complex IT projects, it is important to have access to experienced leadership that understands the complexities of Information Technology. To that end, Intrinium will partner with clients to provide an Intrinium virtual Chief Information Officer (vCIO), to guide the long-term and short-term development of the IT function within their business. A vCIO performs the same functions as a full time CIO, while using only a fraction of the time and leveraging standardized methodologies developed by Intrinium.
Outcomes for the client utilizing a vCIO include:
An initial assessment of people, process and technology and the alignment of those pillars with the business strategy
Monthly, executive-level IT dashboards describing the state and quality of the services provided by IT
3-year IT road map with business alignment, completed/updated annually
Workflow analysis and recommendation as needed/changes introduced
Monthly metric reporting for the CIO role, describing the posture of the organization
Management/direction of the IT controls to be implemented
Annual IT budget preparation and support
As needed technical contract review for new IT purchases/implementations
Management of the risk register, including audit findings, with quarterly reporting to Leadership
As the need for privacy and security continues to grow every day, it is important to have access to experienced Information Security leadership that understands the complexities of the ever-evolving threat landscape. To that end, Intrinium will partner with our client to provide an Intrinium virtual Chief Information Security Officer (vCISO), to guide the long-term and short-term development of the information security risk management function within the organization. A vCISO performs the same features similar to a full-time CISO, while using only a fraction of the time and leveraging standardized methodologies developed by Intrinium.
Outcomes for the client utilizing a vCISO include:
Monthly metric reporting for the vCISO role, describing the posture of the organization
Quarterly vCISO reviews with Executive Leadership and the Board as required
Leading the development of client's information security architecture
Annual InfoSec budget preparation and support
Evaluating regulatory compliance requirements and implementing controls to meet compliance requirements
Directing the establishment of policies, procedures and standards
We are here to help, contact us today.
Multi-factor authentication (MFA) is a method of authentication in which a computer user is given access after presenting two or more pieces of evidence or factors to an authentication mechanism.
Starting tomorrow, May 3rd, we are rolling out a new format and frequency to our Executive Reports. Our intent with the new look and feel is to help make the data more easily understood and digestible in terms of "What Happened" and "What is Happening" in your IT...
Password Managers do just that, allowing you to almost outsource the storing, memorization, and generation of passwords while maintaining only a single password that you have to remember to access the rest.
Incident Response Plans need to be written and tested since the output will probably be used in a court of law.
By Samantha Agather, Information Security Analyst - Intrinium The Low Down on Intrusion Prevention and Detection Services In an ideal world, companies could focus all their time and resources on their products and services. However, our world is far from perfect, and...
Chiara Morrison, Marketing, Manager sat down to interview Manager, Security Consulting, and the founder of DC509, Kylie Martonik to talk about her contribution to the new the book, Tribe of Hackers.
One of the easiest and most effective ways to boost your organization’s performance metrics might be to hand the management of your network over to a highly qualified firm. When it comes to operationalizing your network, a business’ managed IT services provider can...
Chiara Morrison - Manager, Marketing Spokane Mayor's Cyber Cup 2019 Chiara Morrison sat down to interview the creator of Spokane Mayor’s Cyber Cup 2019, Max Dulin, Senior at Gonzaga University, Computer Science Major. Chiara: Max, can you tell me a little bit about...
Chiara Morrison - Manager, Marketing What is an Internal Vulnerability Test? The Intrinium Internal Vulnerability Assessment evaluates IT security from the inside of your organization and identifies critical vulnerabilities that could be exploited by attackers that...
Chiara Morrison - Manager, Marketing What is a Risk Assessment? Risk Assessment is the combined effort of executing the following: 1. Identifying and analyzing potential (future) events that may negatively impact individuals, assets, and/or the environment (i.e.,...