Petra Mayer & Associates Consulting - Cyber Security Assessment
Project scope
Categories
Security (cybersecurity and IT security)Skills
incident response cyber security incident reporting vulnerabilityThe main goal of this project is to plan, implement, manage, monitor and upgrade security measures for the protection of Petra Mayer & Associates Consulting's data, systems and networks.
Even though, the organization is a very small business, there may be hidden security issues that need to be revealed in the use of technology, third party platforms and integration of client and contractor systems.
The goal is to gain clarity on security risks and a risk mitigation plan that is effective and at the same time can be implemented in a small 1-person consulting business.
This will involve several different steps for the learners, including:
- Analysing the existing security measures of Petra Mayer & Associates Consulting and create / offer suggestions for our security policy
- Analyzing networks and systems and assessing areas for improvement
- Researching other security measures that can be implemented
- Review the process for vulnerability testing and help develop any best proactive policies to keep up with the current cybersecurity landscape
- Detecting and analysing any incidents, review incident reporting, and create an incident response plan
- Reviewing the system infrastructure and overlaps with third party systems for areas of vulnerability
- Providing recommendation for system changes to minimize risks
- Identifying prioritized action items
Set up of the project early on and act as stakeholder as well as final decision maker. The group of learners are self-reliant and driven and will request the level of support they need.
I will also be available for interviews and research to provide access to the required information as well as provide individual feedback if desired.
About the company
At Petra Mayer & Associates Consulting, we help you with customized and effective training services so our clients can increase productivity and scalability by offering engaging learning solutions.
We see ourselves as partners of our clients and work with them over longer timeframes and multiple projects. This may open our systems up to more vulnerability as we use client systems.
While we are a company of one, we do work with contractors who are entrepreneurs in their own rights. That is another potential area of vulnerability.
We need to protect our own systems and that of our clients.