GOVERN - IDENTIFY - PROTECT - DETECT - RESPOND - RECOVER
Personal Info Risk Assessment:
Start with an Analysis, Risk Score, Report Free: Personal Info Risk Score
Business Info Risk Analysis & Detection:
Helping organizations protect against serious cyberthreats such as ransomware.
Only $49 per User/Month
Add End Point Security - endpoint detection and response (EDR) for only $30 per PC/Server per Month.
Unsure of the information risks inside your company?
Conduct a Business Workshop to prioritize remediation and also earn Continuing Education (CE/CPE/CLE) credits
Need assistance with a new or existing project?
Let us optimize your processes with an Initial Data & Technology Insights Engagement
Need to protect sensitive data workflows immediately?
Leverage our All-in-one Information Protection Platforms for Users. Sensitive Information: Discovery, Implementation, Configuration, & Reporting
Hire an individual or team of experts for more complex projects and programs.
Choose our bespoke Advisory Services: Consulting, Training, Coaching, Remediation & Implementation
SERVICE COMPARISON CHART
〇 | ◔ | ◑ | ◕ | ⬤ |
---|
Solutions & Services: | Info Risk Analysis & Detection | Information Governance Workshop | InfoAdvisor™ Discovery | InfoClave™ Secure Enclave as a Service | VIP Advisory Services |
---|---|---|---|---|---|
Description | Don't know your information risk profile? Start with a Risk Score, Report, & Cyber Insurance Quote | Unsure of the information risks inside your company? Conduct a Business Workshop to prioritize remediation and also earn Continuing Education (CE/CPE/CLE) credits | Need assistance with a new or existing project? Let us optimize your processes with an Initial Data & Technology Insights Engagement | Need to protect sensitive data workflows immediately? Leverage our All-in-one Information Protection Platforms for Users. Sensitive Information: Discovery, Implementation, Configuration, & Reporting | To hire an individual or team of experts for more complex projects and programs, choose our Custom Advisory Services: Consulting, Training, Coaching, Remediation & Implementation |
Client Participants | ✔ Up to 2 Attendees | ✔ Up to 8 Attendees | ✔ Up to 10 Interviews | ✔ 10+ Client Users | ✔ Custom |
Audience | ✔ Business Owners, Core Business leaders, HR, Legal, Compliance, Records/Data, IT, Security, Risk, Entrepreneurs, Solopreneurs | ✔ C-Suite, Core Business leaders, HR, Legal, Compliance, Records/Data, IT, Security, Risk | ✔ C-Suite, Core Business leaders, HR, Legal, Compliance, Records/Data, IT, Security, Risk | ✔Entrepreneurs, Solopreneurs, Sensitive Data Business & Consumer Users, HR, Legal, Compliance, Records/Data, IT, Security, Risk | ✔ High Net Worth Consumers, Government Officials, Influencers, C-Suite, Core Business leaders, HR, Legal, Compliance, Records/Data, IT, Security, Risk |
Deliverables | ✔ Free Internet Risk Score & Cyber Insurance Quote ✔ Paid Report High Level Risk Remediation Plan ✔ Cloud Data Protection ✔ Dark Web Monitoring ✔ Cloud Directory Monitoring ✔ Email Protection ✔ End Point Security ✔ Secure Browsing ✔ Security Awareness Training ✔ Phishing Simulations | ✔ Roadmap ✔ Worksheets & Certificates ✔ Internet Risk Score ✔ Paid\ Report High Level Risk Remediation Plan | ✔ Detailed Analysis ✔ Detailed Risk Remediation Roadmap ✔ Playbooks | ✔ Detailed Analysis ✔ Detailed Risk Remediation Roadmap ✔ Project Plan ✔ Features: VPN, SSO, Encryption, Data Loss Prevention, Compliance Monitoring & Reporting | ✔ Detailed Analysis ✔ Detailed Risk Remediation Roadmap ✔ Multi-Tiered Project Plans, KPI/KRI Reports, Workshops, Vendor Management, & More |
Advisors | 1-2 | 2-3 | 1-2 | 1-3+ | 3+ |
Tech Consultants | 0 | 0 | 2-3 | 2-3 | 3+ |
People Analysis | - | Yes | Yes | Yes | Yes |
Process Analysis | - | Yes | Yes | Yes | Yes |
Technology Analysis | Yes | - | Yes | Yes | Yes |
Technology Execution | Yes | - | - | Yes | Yes |
Software Licensing | - | - | - | Yes | Yes |
Contract | - | - | Yes | Yes | Yes |
Business | ✅ | ✅ | ✅ | ✅ | ✅ |
IT | ✅ | ✅ | ✅ | ✅ | ✅ |
Security | ✅ | ✅ | ✅ | ✅ | ✅ |
Privacy | ✅ | ✅ | ✅ | ✅ | ✅ |
Risk | ✅ | ✅ | ✅ | ✅ | ✅ |
Legal | ✅ | ✅ | ✅ | ✅ | ✅ |
Records/Data | ✅ | ✅ | ✅ | ✅ | ✅ |
GOVERN | ✅ | ✅ | ✅ | ✅ | ✅ |
IDENTIFY | ✅ | ✅ | ✅ | ✅ | ✅ |
PROTECT | ✅ | ✅ | ✅ | ✅ | ✅ |
DETECT | ✅ | ✅ | ✅ | ✅ | ✅ |
RESPOND | - | - | - | ✅ | ✅ |
RECOVER | - | - | - | - | ✅ |
Timeframe | 24 Hours | 3 Days | 3 Weeks (Min.) | 1-3 Weeks (Min.) | 3-6 Months (Min.). |
Pricing | $$/User/Mo | $,$$$ | $$,$$$ | $$,$$$+ /yr | $$$,$$$+ |
〇 | ◔ | ◑ | ◕ | ⬤ | |
---|---|---|---|---|---|
DATA | INFORMATION | KNOWLEDGE | WISDOM | TRUST |
1.1 Establish Information Valuation & Classification
1.2 Complete Information Inventory
1.3 Map Data Flows
1.4 Determine Information Values, Efficiencies, and Control Requirements
2.1 Understand / Create Governance Structure & Identity Personas
2.2 Determine Decision-Making Process
2.3 Ratify Governance Structure
2.4 Determine Compliance Monitoring Process
3.1 Create / Update Information Policy & Standards
3.2 Establish Internal Review and Processes
3.3 Publish Information Policy & Standards
4.1 Create / Update Training, Marketing, Communication Content & Plans
4.2 Update Review and Approval Process
4.3 Update General Security Awareness Curriculum
4.4 Conduct Role Specific Training & Marketing
4.5 Develop Training & Marketing Content
4.6 Conduct End-User Training
5.1 Determine Solutions & Controls for Critical Unstructured Information
5.2 Determine Business Impact of Proposed Solutions
5.3 Deploy Solutions for Pilot Deployments
5.4 Evaluate Pilot Deployment Scenarios
5.5 Deploy Solutions & Controls for High-Risk Unstructured Information
6.1 Determine Solutions & Controls for Critical Structured Information
6.2 Determine Business Impact of Proposed Solutions
6.3 Deploy Solutions for Pilot Deployments
6.4 Evaluate Pilot Deployment Scenarios
6.5 Deploy Solutions & Controls for High-Risk Structured Information
7.1 Determine Risk & Threat Monitoring Solutions
7.2 Develop Response Procedures for Business Continuity and Disaster Recovery
7.3 Deploy Monitoring Systems
7.4 Monitor & Report Event Activity
7.5 Monitor Requirement Changes
Powered By:
a b c d e f g h i j k l m n o - Do not remove from template!!! it is important to support different fonts
HAPPY NEW YEAR!
Info Risk Scores, Data Protection, and Endpoint Detection software, services, and response are provided by third-party providers. INFOADVISOR™s are independent professionals who offer agnostic advisory services and do not develop, sell, or endorse any specific software or security solutions. All INFOADVISOR™s operate with professional autonomy and are protected by Errors & Omissions (E&O) insurance and Cyber Insurance, ensuring the highest standards of advisory integrity, risk management, and data security. Clients should evaluate all third-party services independently before making decisions.
All Rights Reserved | NAM International, LLC.