Security Management Services

Protect Your Business Purpose

Security Management Services

For more than two decades, HALOCK Security Labs has helped implement and maintain information security programs to help protect our clients’ critical assets. Our Purpose Driven Security® approach utilizes risk assessments and risk management principles to prioritize and optimize your security information management investment. Through the Duty of Care Risk Assessment (DoCRA) standard, HALOCK helps to define Acceptable Risk and Reasonable Controls that considers all interested parties without overly burdening your organization. We apply the right amount of cyber security assessment and management to protect your organization’s mission, objectives, and obligations – satisfying compliance requirements and supporting social responsibility and corporate goals. You achieve reasonable and appropriate risk and security management strategies. Getting to reasonable has never been easier. Maintaining your Security Program is a priority for HALOCK.  Our Risk Management Program can provide you with on-going fractional cyber security experts, tools and frameworks to operate and maintain your program to keep risk low and align with the needs of all parties. We support your management of risks operations. HALOCK can provide you with the perspective, tools and frameworks to prioritize and control cyber security asset management initiatives so that they align with corporate objectives and are more likely to succeed in your unique environment.

 

Reasonable Security Resources

In Archive360’s Podcast Episode 29: What is “Reasonable Data Security”?, Bill Tolson and Chris Cronin, Partner, Governance and Engineering Practice at HALOCK Security Labs try and define “reasonable data security” – a term that continually appears in every states’ privacy law or proposed legislation.

PODCAST: Cybersecurity Where You Are, co-hosts Tony Sager and Sean Atkinson are joined by Chris Cronin, ISO 27001 Auditor and Partner at HALOCK, a leading information security consultancy. Their discussion focuses on “reasonableness” as it relates to cybersecurity risk management.

RIMS: RiskWorld Recording: Reasonable Security & The Questions a Judge Will Ask You After a Data Breach In post-data breach litigation, you must demonstrate due care and reasonable control. Learn what basic questions the court will ask and how the duty of care risk assessment (DoCRA)—based on judicial balancing tests and regulatory definitions of reasonable risk—helps you answer them. 

RSA CONFERENCE 2022: A Proven Methodology to Secure the Budget You Need in a Transforming World  |  Recording of Presentation

   Learn how to establish reasonable security. Reasonable Risk