vCIO & vCISO

vCIO

As an organization embarks on several essental and complex IT projects, it is important to have access to experienced leadership that understands the complexities of Information Technology. To that end, Intrinium will partner with clients to provide an Intrinium virtual Chief Information Officer (vCIO), to guide the long-term and short-term development of the IT function within their business. A vCIO performs the same functions as a full time CIO, while using only a fraction of the time and leveraging standardized methodologies developed by Intrinium.

Outcomes for the client utilizing a vCIO include:

An initial assessment of people, process and technology and the alignment of those pillars with the business strategy
Monthly, executive-level IT dashboards describing the state and quality of the services provided by IT
3-year IT roadmap with business alignment, completed/updated annually
Workflow analysis and recommendation as needed/changes introduced
Monthly metric reporting for the CIO role, describing the posture of the organization
Management/direction of the IT controls to be implemented
Annual IT budget preparation and support
As needed technical contract review for new IT purchases/implementations
Management of the risk register, including audit findings, with quarterly reporting to Leadership

vCISO

As the need for privacy and security continues to grow every day, it is important to have access to experienced Information Security leadership that understands the complexities of the ever-evolving threat landscape. To that end, Intrinium will partner with our client to provide an Intrinium virtual Chief Information Security Officer (vCISO), to guide the long-term and short-term development of the information security risk management function within the organization. A vCISO performs the same features similar to a full-time CISO, while using only a fraction of the time and leveraging standardized methodologies developed by Intrinium.

Outcomes for the client utilizing a vCISO include:

Monthly metric reporting for the vCISO role, describing the posture of the organization
Quarterly vCISO reviews with Executive Leadership and the Board as required
Leading the development of client's information security architecture
Annual InfoSec budget preparation and support
Evaluating regulatory compliance requirements and implementing controls to meet compliance requirements
Directing the establishment of policies, procedures and standards

We are here to help, contact us today.

SMB Relay Attack Tutorial

Don’t even bother cracking NTLMv2 hashes gathered with Responder! Instead, just relay them to a target machine on the network and pop yourself into a LocalSystem shell. This attack uses the Responder toolkit to capture SMB authentication sessions on an internal network, and relays them to a target machine.

Buzzword Breakdown: “Cyber Kill Chain”

By Sahan Fernando - Director, Managed Security - Intrinium  Before I begin, I have to disclose that I attend a lot of conferences. I love continuing education and interacting with fellow infosec professionals. I also struggle with #badgelife, which is your efforts to...

Pin It on Pinterest