
Governance
• Cybersecurity Governance Framework Risk Assessment
• Cybersecurity Strategic Plan

Compliance
• Compliance Function Assessment
• FERPA
• FIPA
• Gramm-Leach-Bliley Act (GLBA)
• HIPAA
• PCI DSS Compliance

IT Risk Management
• IT Risk Management Function Assurance
• Information Technology Risk Officer

Cybersecurity
• Web Application Penetration Testing
• Source Code Review
• Outsourced CISO Function
• Cloud Infrastructure Security Assessment
• Cyber Risk Posture Assessment
• Mobile Application Security Assessment
• Penetration Testing
• Cybersecurity Comprehensive Risk Assessment
• Risk Assessment Remediation
• Software Security Assurance
• Vulnerability Assessment

IT Audit
• Application Security Controls Audits
• Cybersecurity Compliance Audit
• IT Function Audit
• IT General Controls Audits

Incident Management and Response
• Data Breach Investigation
• Policy and/or Code of Conduct Investigations
• Computer/telephony Forensics
• Electronic Discovery
• Financial Fraud Forensics Investigation
• Malware Analysis
• Workplace Harassment
• Digital Forensics Litigation Support