vCIO & vCISO
vCIO
As an organization embarks on several essential and complex IT projects, it is important to have access to experienced leadership that understands the complexities of Information Technology. To that end, Intrinium will partner with clients to provide an Intrinium virtual Chief Information Officer (vCIO), to guide the long-term and short-term development of the IT function within their business. A vCIO performs the same functions as a full time CIO, while using only a fraction of the time and leveraging standardized methodologies developed by Intrinium.
Outcomes for the client utilizing a vCIO include:
An initial assessment of people, process and technology and the alignment of those pillars with the business strategy
Monthly, executive-level IT dashboards describing the state and quality of the services provided by IT
3-year IT road map with business alignment, completed/updated annually
Workflow analysis and recommendation as needed/changes introduced
Monthly metric reporting for the CIO role, describing the posture of the organization
Management/direction of the IT controls to be implemented
Annual IT budget preparation and support
As needed technical contract review for new IT purchases/implementations
Management of the risk register, including audit findings, with quarterly reporting to Leadership
vCISO
As the need for privacy and security continues to grow every day, it is important to have access to experienced Information Security leadership that understands the complexities of the ever-evolving threat landscape. To that end, Intrinium will partner with our client to provide an Intrinium virtual Chief Information Security Officer (vCISO), to guide the long-term and short-term development of the information security risk management function within the organization. A vCISO performs the same features similar to a full-time CISO, while using only a fraction of the time and leveraging standardized methodologies developed by Intrinium.
Outcomes for the client utilizing a vCISO include:
Monthly metric reporting for the vCISO role, describing the posture of the organization
Quarterly vCISO reviews with Executive Leadership and the Board as required
Leading the development of client's information security architecture
Annual InfoSec budget preparation and support
Evaluating regulatory compliance requirements and implementing controls to meet compliance requirements
Directing the establishment of policies, procedures and standards
We are here to help, contact us today.
Remote Work Security for Defenders
With more and more companies having non-essential personnel working at home to reduce risk, we wanted to touch on some of the risks from a defender standpoint. One of the big things in my mind is that attackers are using the cover of increased remote work to try and...
Remote Pentesting in an Isolated World
All the discussions and media coverage surrounding COVID-19 are enough to make anyone wish to unplug from it all and while this is admittedly a fantastic way of cleansing the mental palette to focus on the more essential aspects of life, cyber criminals are working...
5 Ways Managed IT Provides Remote Support
Managing your business’ IT when you aren’t able to be on site can be complicated. Intrinium’s experts are available to remotely support your business, assist in navigating your IT challenges and ultimately save you time, money and increase your productivity. If you...
Business Continuity Through Remote Operations
The coronavirus pandemic has caused a unique shift in our lives. From families to businesses to first responders, everyone has been impacted. We wanted to send you an update on how we are ensuring our clients are secure, and how we can help your business get set up to...
3rd Party in Conjunction with Shared IT Service Delivery Model
As organizations become increasingly reliant on information and technology as critical business assets, IT must be prepared to deliver service that is available, confidential, and has integrity. Traditionally, a lot of organizations have either utilized an internal IT...
Best Practices: Fortinet FortiGate Firewall Hardening
By Sahan Fernando - Director, Managed Security - Intrinium As business needs continue to develop, many organizations are turning to devices to effectively provide availability, confidentiality, and integrity for their networks. The buzz around “next-gen” firewalls is...
Understanding Incident Response, Planning and Cyber Insurance
In less than one year, we’ve seen whole cities taken out by ransomware with no business continuity or disaster recovery plan in place to bring themselves back up- but it’s not just cities that don’t have a plan for when a catastrophe (digital or physical) hits.
Having a plan to restore business operations will save time, money, and stress, but that’s half the equation. The other half is to practice the plan, make sure all the moving pieces fit together and make sure everything is practical and timely. Enough businesses have spent six digits or more due to not having an incident response plan- set your business and your industry apart.
Incident Response Plans: More Planning, Less Panic
In less than one year, we’ve seen whole cities taken out by ransomware with no business continuity or disaster recovery plan in place to bring themselves back up- but it’s not just cities that don’t have a plan for when a catastrophe (digital or physical) hits.
Having a plan to restore business operations will save time, money, and stress, but that’s half the equation. The other half is to practice the plan, make sure all the moving pieces fit together and make sure everything is practical and timely. Enough businesses have spent six digits or more due to not having an incident response plan- set your business and your industry apart.
Multi-factor Authentication 101
Multi-factor authentication (MFA) is a method of authentication in which a computer user is given access after presenting two or more pieces of evidence or factors to an authentication mechanism.
Welcome to the New Intrinium Executive Reports
Starting tomorrow, May 3rd, we are rolling out a new format and frequency to our Executive Reports. Our intent with the new look and feel is to help make the data more easily understood and digestible in terms of "What Happened" and "What is Happening" in your IT...