![Security Program](https://www.halock.com/wp-content/uploads/2023/11/1-Cyber-Risk-Business-Continuity-300x300.webp)
HALOCK’s Security Program Review is based on ISO 27001 and 27002. It provides a baseline of your current security posture.
Architecting and implementing a robust, mature information security program requires close alignment with business objectives, demonstrated organizational commitment, support from the top down and a consistent approach for implementing, monitoring and improving information security that integrates with the organizational culture.
(A 40 word sentence. My English teacher would be crying right now.)
What’s involved?
- Standards overview and introduction to ISO 27001/27002
- Business overview and Interviews with Sponsors
- Identification of key information assets and business processes
- Interviews with key personnel
- High level review of security controls across all 12 ISO domains
- Review of management sytem processes and procedures
- Provide guidance toward a mature security program
Deliverables coming out of a security program review include:
- Executive summary – Maturity Level Methodology
- Assessment summary
- Priority level methodology
- Summary of findings with recommendations
Nancy Sykora
Sr. Account Executive
![Startup Cyber Security](https://www.halock.com/wp-content/uploads/2019/07/Cyber-Security-Startup-Entrepreneur-150x150.jpg)