/*
Customise Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorised as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Performance cookies are used to understand and analyse the key performance indexes of the website which helps in delivering a better user experience for the visitors.

Advertisement cookies are used to provide visitors with customised advertisements based on the pages you visited previously and to analyse the effectiveness of the ad campaigns.

/*]]>*/

Expert Cybersecurity Leadership:

Fractional Chief Information Security Officer (On-Demand)

Strong cybersecurity leadership is among the most expensive staffing consideration for businesses today, and can be overkill for small and medium-sized businesses. However, part-time, on-demand arrangements are much more affordable, and may fit your business on a regular-basis, or even temporarily. Fractional CISO’s use tools to securely deploy and manage solutions like RMM (see define RMM), EDR, assisting with Risk Transfer Startegies (see cybersecurity insurance) and assist with other Cybersecurity Best Practices.  Here are the fractional CISO offers from TEKRiSQ;

MyFirstCiSO

SHORT-TERM, FRACTIONAL CISO

A 3 Week Engagement to bring some initial cybersecurity leadership into a part-time role, affordably priced for a short initial term.

Deliverables include:
- Posture Management Report (pre-remediation) including an Posture Overview, Application Overview, and Data Overview.
- Documented Recommendations and Remediation Support for Optimized Controls, disabling access to inappropriate applications, removing sharing links that are either dated or unsafe.
- Posture Management Report (post remediation).

Interested in a Chat? Discuss your needs with us here

On-Demand CiSO

LONGER-TERM, FRACTIONAL CISO

Flexible Engagements to bring ongoing cybersecurity leadership into a part-time role, with attractively priced tiers for longer terms.
This TEKRiSQ package uses the data captured by our foundational controls deployed into the client's environment. More specifics included can be found below.

Annual CiSO

12 MONTH FRACTIONAL CISO GIG

A 12-month part-time role, with attractive priced tiers for a 12-month term.
This TEKRiSQ package uses the data captured by our foundational controls deployed into the client's environment.
More specifics included can be found below.

Specific Responsibilities:
- Identify /manage misconfigurations, security drifts & compliance breaches within your cloud environment (O365 or G Suite)
- Provide remediation support for misconfigurations for your O365 or G Suite environments.
- Provide recommendations and remediation support for security best practices for your O365 or G Suite environments. (Controls based on CIS & ISO 27001 including approx. 100 factors covering access controls, security, and data loss prevention)
- Provide ongoing audit & analysis for employees using multiple risk factors to gain visibility into potential business, security, and compliance risks of each application and browser extension. The analysis looks at each application, permissions enabled by each application (e.g. access control, API access, mailbox access, organizational information & resources access, printer access, Teams/Channels/Skype access, and Active Directory access.)
- Provide on-going audit of shared data including: data Open to anyone links, shared to external user links, company links, and internal user sharing links. - On-going monitoring cloud configuration data for the O365 or G Suite Environments.
- Ongoing vulnerability scanning, recommendations & remediation support
- Shadow IT Analysis & recommendations, Data Audit, and Application Risks.
- Data leakage analysis
- MFA Risk analysis, recommendations, and remediation support
- Email security analysis recommendations, and remediation support
- Password management practice audit, recommendations, and remediation support
- Privileged access management analysis, recommendations, and remediation support
- Remote workforce risk analysis, risk identification, recommendations, and remediation support
- Incident Response plan analysis and recommendations
- Disaster Recovery plan analysis and recommendations

Deliverables include:
- Monthly Posture Management Report
- Monthly CVE Vulnerable Summary Report
- Monthly Application Report
- Monthly Status Update Meeting
- On-Demand Discussions as needed
- Remediation support and configuration

 

Contact TEKRiSQ to learn more about our solutions.

 
Get Started Now