- Project Launch and Information Gathering
- The AdvantageCIO consulting engagement begins with a kick-off meeting to identify key individuals, discuss the goals and business objectives based on the status of the existing information security program, and collect existing documentation including previous assessment, audit, and examination reports.
- On-Site Assessment and Evaluation
- Our technology consultants will schedule an on-site visit to collect information relative to the Information Security Risk Assessments, Security Policies, Incident Response and Business Continuity Plans. This will include interviews with key personnel and physical inspection of network infrastructure and access controls.
- Document Development and Review
- Once the required information has been gathered, the documentation is generated and presented for review. During the review process, any necessary modifications are made and final drafts delivered.
- Implementation and Preparation
- A qualified technology consultant will schedule a document walk-through with your management team to ensure the accuracy and understanding of the contents prior to approval by the Board of Directors. This process may be repeated prior to any scheduled IT audit or examination.
- Repeat Annually
- AdvantageCIO recommends that this process is repeated on an annual basis to ensure the documents remain accurate and relevant to your business operations and IT environment.
See what AdvantageCIO has to offer!
AdvantageCIO products are now available to order in the store.