Cisco Security Advisory Services Information Security Governance, Risk, and Compliance

Governance, Risk,
and Compliance
Cisco Security Advisory Services
Information Security
Information is one of the most valuable resources in
business, and the continued expansion of the Internet
of Everything (IoE) is making it increasingly more vital to
secure connections between people, processes, data, and
things. Organizations today need cybersecurity solutions
that work intelligently with your networks, applications, and
infrastructure so you can take advantage of the opportunities
of IoE and related cloud and mobility technologies while
effectively managing security and risk.
Benefits
More Connections, More Threats to Information Security
• Protect Your Data and Infrastructure
Identify and mitigate the most common
infrastructure, application, and operational
vulnerabilities
Many organizations, however, do not have a clear understanding of
what information is most critical, where it is located, or how it should
be managed. Tracking the various applications that support business
processes—including where they are located, which ones are vulnerable,
which ones process regulated information, and how they change over
time—can be difficult.
• Ensure Effective Programs Are in Place
Provide comprehensive application,
network, operations, and organizational
security
• Perform Proactive Threat Management
Prepare for new and evolving threats
• Ensure Organizational Alignment
Allocate security resources and
investments to support business strategies
• Meet Compliance Requirements
Understand and maintain ISO 27001,
PCI DSS, and other certifications and
standards
Improve Protection of Your Business Assets
Cisco® Security Advisory Services for Information Security help
organizations maintain the confidentiality, integrity, and availability of
critical business assets, as well as manage complex risk and compliance
requirements with greater ease and efficiency. Our experts draw on
years of experience, proven methodologies, and advanced tools to help
organizations protect critical business assets and manage security across
the IT infrastructure.
We start by listening to your challenges and goals. Then we collaborate
to customize proven governance frameworks and strategies to meet
each client’s unique needs and provide robust risk and compliance
management, innovative approaches to IoE security, and world-class
threat management. Through our partnership, you uncover new ways to
think about security and its impact on your business. You gain knowledge
that helps your teams anticipate threats, adapt to the changing security
landscape, and develop a strong security posture. With greater knowledge
about security, you’ll think differently about business.
More About Our Services
• Information Security Risk Assessment: Identifies and prioritizes
strategic, operational and systemic information and system risks that
affect the execution of IT strategies and recommends treatment to
reduce or eliminate unacceptable risks.
© 2015 Cisco and/or its affiliates. All rights reserved.
Cisco Security Advisory Services: Information Security
• Information Risk Program Development: Builds a solid
risk management foundation through the creation of a
new information security program, customization of an
existing program, or revamping your strategy to support
new IT initiatives.
• Information Security Program Assessment: Holistically
addresses application, endpoint, and network vulnerabilities
with consolidated processes, policies, and controls to
create a comprehensive and measurable information
security program that protects your business.
• ISO 27001 Advisory Services: Understand the
certification process and determine your current level
of preparedness to gain ISO 27001 certification.
• ISO 27002 Assessment: Determines organizational
alignment to ISO 27002 controls and defines
remediation plans to address gaps.
Cisco Advisory: Seasoned Security Professionals
As strategic and technical advisors, Cisco Security Advisory
Services help leading organizations and executive teams
identify strategic opportunities in information security to
improve performance and create long term and sustainable
business value.
Backed by a superior combination of resources — vast
research and threat intelligence, mature methodologies,
and multidisciplinary experts across security, cloud,
mobility, collaboration, and data center operations—our
clients better manage risk and compliance, develop a
strong security posture, control cost, and achieve strategic
IT and business objectives.
Technology-Enabled Consulting with Cisco
Advisory Accelerator Advisory
Accelerator is our project management, workflow,
and reporting platform for security assessments. It
enables rapid execution of project tasks, integrates with
many of our security assessment tools, and facilitates
efficient report generation and consultant collaboration.
Advisory Accelerator provides large scale efficiencies,
allowing consultants more time on in depth analysis, as
a collaborative extension of the consulting expertise that
Cisco provides.
Key Features
Case Study: Technology Provider
Challenges
• Enable “bring your own device” (BYOD) for
workforce flexibility
• Mitigate information security risk associated
with BYOD
Solution
• Advisory services for development of BYOD policies
• Integrate BYOD with information security policies
• Refine related policies as needed
Outcomes
• Operationalized new policies and standards
to enable BYOD
• Integrated and developed sustainable mobile
workforce security controls and updated
network controls
• Mitigated BYOD-related threats
• Assessment guidance, workflow and reporting
• Trend analysis to support ROI, budget planning
and product selection
• Expert collaboration, brainstorming and strategy support
• Crowd-sourced, quality controlled knowledge engine
Next Steps
• Faster ramp of inexperienced security professionals
Visit www.cisco.com/go/securityservices to connect
with our advisors and protect your business today.
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco
trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R) DEC14CS4667 09/15