vCIO & vCISO
As an organization embarks on several essental and complex IT projects, it is important to have access to experienced leadership that understands the complexities of Information Technology. To that end, Intrinium will partner with clients to provide an Intrinium virtual Chief Information Officer (vCIO), to guide the long-term and short-term development of the IT function within their business. A vCIO performs the same functions as a full time CIO, while using only a fraction of the time and leveraging standardized methodologies developed by Intrinium.
Outcomes for the client utilizing a vCIO include:
An initial assessment of people, process and technology and the alignment of those pillars with the business strategy
Monthly, executive-level IT dashboards describing the state and quality of the services provided by IT
3-year IT roadmap with business alignment, completed/updated annually
Workflow analysis and recommendation as needed/changes introduced
Monthly metric reporting for the CIO role, describing the posture of the organization
Management/direction of the IT controls to be implemented
Annual IT budget preparation and support
As needed technical contract review for new IT purchases/implementations
Management of the risk register, including audit findings, with quarterly reporting to Leadership
As the need for privacy and security continues to grow every day, it is important to have access to experienced Information Security leadership that understands the complexities of the ever-evolving threat landscape. To that end, Intrinium will partner with our client to provide an Intrinium virtual Chief Information Security Officer (vCISO), to guide the long-term and short-term development of the information security risk management function within the organization. A vCISO performs the same features similar to a full-time CISO, while using only a fraction of the time and leveraging standardized methodologies developed by Intrinium.
Outcomes for the client utilizing a vCISO include:
Monthly metric reporting for the vCISO role, describing the posture of the organization
Quarterly vCISO reviews with Executive Leadership and the Board as required
Leading the development of client's information security architecture
Annual InfoSec budget preparation and support
Evaluating regulatory compliance requirements and implementing controls to meet compliance requirements
Directing the establishment of policies, procedures and standards
We are here to help, contact us today.
Chiara Morrison - Manager, Marketing All businesses, large and small, face the growing challenge of Information Security within the organization. As an SMB, we know you want to protect your clients’ data and meet compliance requirements without allocating a...
A side-channel attack is an attack vector through which a threat could glean information from your computer or information system. This could be as simple as reading emissions (see Emissions Security or EMSEC) from your computer to using sophisticated methods of monitoring data being written onto your hard disk and making determinations that way.
By Shea McHugh -Information Security Analyst- Intrinium Streamlining Technology Security for SMB External penetration testing is a great first step in assessing your network. After your network assessment is completed, we recommend reviewing your approach...
Chiara Morrison - Manager, Marketing 2018 has been the year of regulation in the Information Security community from General Data Protection Regulation (GDPR) to the California Consumer Policy Act (CCPA), privacy and security is more important than ever. 2019 is...
Chiara Morrison - Manager, Marketing As we wrap up the year, we wanted to share some of our favorite and most trafficked blog posts from our staff writers. We hope you enjoy! https://intrinium.com/smb-relay-attack-tutorial/ https://intrinium.com/events-2/...
How to Set Up and Configure Multi-Factor Authentication in the Office 365 Admin Center We recommend activating and configuring your multi-factor authentication to ensure you are optimizing your cybersecurity for your Office 365 platform. Before beginning, it is...
By Chiara Morrison - Manager, Marketing As we head into the holiday season, The National Cybersecurity & Communications Integration Center (NCCIC), reminds users to be aware of seasonal scams and malware attacks. As of the NCCIC release on November 19th, 2018,...
By Tracy Martin – Senior Information Security Consultant – Intrinium Developing a budget for your information security program can be challenging. Priorities have a way of changing throughout the year, regulations change, or new regulations, such as the GDPR, are...
By Sahan Fernando - Director, Managed Security - Intrinium Phishing is constant, relentless and a perpetually annoying threat for all Information Security professionals. As we move into year-end, it is important to remind your staff that phishing is all about being...
By Sahan Fernando - Director, Managed Security - Intrinium Budget success depends on having a strategic IT plan and vision, executed by a strong leader and supported by good processes. With the fiscal year 2019 right around the corner, this is something we all need! ...