Applications and Database key control management, internal audit remediation and testing. Identification of control risks and appropriate road maps to address current and future risk.
Penetration testing, vulnerability analysis for both internal as well as external threats. Full scale pen testing for networks, systems, databases and cloud environments.
Identity & Access Management
Enterprise Access Management and security modeling for applications. Hardening of assets and identification of external/internal threat management.
Stewardship, Custodianship and Business focused context to define the myriad of rules and policies for both data and systems, data quality metrics, data governance metrics full data at rest and data in-flight lineage leading to transparency.