Students collaborating in a library

Services

Security Awareness & Training

- Conducting cybersecurity awareness training for employees.

- Guiding secure data handling and best practices.

Governance, Risk, and Compliance

- Establishing cybersecurity policies, frameworks, and standards (e.g., NIST CSF, CMMC, HIPAA).

- Conducting risk assessments and maintaining a risk register.

- Ensuring compliance with regulations and industry standards.

- Managing third-party/vendor security risks.

- Supporting audit and compliance activities.

Endpoint Management

- Installing and managing EDR on endpoints for real-time threat detection, automated response, and endpoint containment.

- Automated patching, security updates, and endpoint risk assessments.

- Enforcing security baselines, encryption, and access controls.

- Enforcing device encryption (e.g., BitLocker, FileVault) and USB restrictions.

Data Protection & Privacy

- Aligning with HIPAA, GDPR, and other regulatory requirements.

- Privacy impact assessments.

- Ensuring proper data classification and retention.

- Provide guidance and training on proper data handling. 

Vulnerability and Patch Management

- Conducting vulnerability assessments and scans (e.g., Qualys, Nessus).

- Collaborating with IT teams to ensure timely deployment of security patches and mitigation of vulnerabilities.

- Coordinating with IT teams for secure configuration management. 

Security Operations & Incident Response 

- Security monitoring and alerting (e.g., SIEM, SOC services).

- Threat detection and intelligence (identifying and responding to cyber threats).

- Incident response (handling and mitigating security breaches).

- Forensic analysis (investigating security incidents post-breach).

- Conducting tabletop exercises and cyber drills.

Identity and Access Management

- Implementing multi-factor authentication (MFA).

- Managing user access and privileged access control.

- Supporting role-based access control (RBAC) and least privilege principles.

- Monitoring identity threats and enforcing zero trust security.