SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
Presented by:
Taylor Hersom
RSI’s ChiefSecurityOfficer
Presented by:
David Burgeson
RSI’s ChiefOperatingOfficer
Risk
Management Is
An Arduous
Journey
• Cyber regulations are everywhere
• Data breaches are crippling organizations
• Everyone is offering the same risk service
• The bad guys are faster than the good guys
• Third Party or Hiring In-House = Expensive
• Companies have the wrong approach
4
The Current Compliance & Cyber Risk
Landscape
5
What if YOU could assist in The
Compliance/Cyber Risk Journey?
Adapt To Your
Customer’s
Needs
Help Your
Customers
Take Control
Become A
Security
Thought Leader
Increase Your
Overall
Commissions
RSI PROUDLY PRESENTS:
➢ ASSESSMENT BASED ON ANY
MAJOR REGULATION(S)
➢ SIMPLICITY IN MIND
➢ TAKES LESS TIME AND COSTS FAR
LESS THAN COMPETITORS
➢ COMPREHENSIVE RISK SCORES
➢ AUDIT READY RISK REPORT WITH
ROADMAP TO REMEDIATION
➢ SINGLE SAAS PLATFORM TO
MANAGE RISK ENTERPRISE-WIDE
➢ PERSONALIZED DASHBOARD FOR
CYBER RISK MANAGEMENT
➢ ABILITY TO ASSIGN RISKS TO
RESPONSIBLE PARTIES IN THE
ORGANIZATION
➢ TOOL INTELLIGENTLY BUILDS
UPON PROGRESS W/ AUDIT TRAIL
➢ COMPLIANCE ACHIEVED JUST BY
USING CYBERCOMPASS TOOL
➢ YOUR CLIENTS CAN SELF ASSESS
THROUGHOUT THE YEAR
➢ CYBERCOMPASS ADAPTS TO
EVOLVING REGULATIONS AND
FRAMEWORKS
➢ CONTINUOUS SUPPORT DURING
REMEDIATION WITH FORMAL
ATTESTATION FROM RSI
➢ VIRTUAL CISO TEAM AT YOUR
CLIENT’S FINGERTIPS FOR
INDEFINITE CYBER LEADERSHIP
SUPPORT
IDENTIFY YOUR RISKS TAKE ACTION PEACE OF MIND
The CyberCompassTM
Difference
TIME
80+% Faster. In some cases, just a
week to complete.
Typically 2-6 months, depending on
locations. Some last 1 yr+.
REPORTING
Compliance Reports are automatically
generated in seconds.
Manually written with templates.
Takes weeks to complete.
COST
65%+ of typical costs. Affordable
Package options from $600/month
Costly with heavy Professional
Services Charges from $25K-$200K+
MITIGATION
A roadmap to mitigate compliance
and IT risks with vCISO to assist.
Usually little to none. Invoice & Leave
approach.
-
TELARUS
PARTNERS
Partners are now part of the
compliance process with mitigation.
Boxed out by the consultant and
competing against them.
-
Others
Powerful For Us, Simple For Your Customers
Categorically Organized Based On Customer’s Objectives
Tool designed to easily incorporate new frameworks.
Conducting Interviews Is Beautifully Simple
Proprietary Assessment Capabilities
Requirements Re-Written to Be Easily Understood
Designed to Be Simple to Answer. Period.
Include audit evidence, screenshots, or flag for later
Tied to specific regulation
requirements
10
Automated Risk Report
Know WHAT
Your Risk Is…
HOW To
Address It.
Scores Your Risks Based on Likelihood and Impact
Ranked Risks Give You A
Roadmap for Addressment
Additional Revenue
Opportunities for Partners!
Comprehensive Risk Dashboard
Understand your Risk
Level
1
1
Manage Multiple
Assessments
2
2
Know the Important
Issues In Your Company
3
3
Conduct and Track
Employee Cyber Training
4
4
Maintain IT Policies &
Procedures
5
5
Track Your Vendors6
6
Cyber Resources At Your
Fingertips
7
7
Four Packages to Choose From:
vCISO Professional
Services
Our team can assistyour
client in outsourcing
their Cyber Risk
Management
Self
Assessment+
• Self-Conducted
Compliance Assessment
• Onboarding Support
• SaaS Tool Subscription
3
Remote
Assessment
• Remote Compliance
Assessment
• Remote vCISO Support
• SaaS Tool Subscription
1
Onsite
Assessment
• OnsiteCompliance
Assessment
• OnsiteCISO Support
• SaaS Tool Subscription
2
Enterprise
Onboarding
• Training Programfor
Adoption of Cyber Risk
Management Tool
• SaaS Subscription
4
Goodbye Invoice and Leave.
Hello Cyber Confidence.
Contact us:
(512) 600-3200
cybercompass@rsitex.com

Weitere ähnliche Inhalte

Was ist angesagt?

Building a Business Case for DAM
Building a Business Case for DAMBuilding a Business Case for DAM
Building a Business Case for DAMVeeva Systems
 
Journey to Becoming an IT Consultant
Journey to Becoming an IT ConsultantJourney to Becoming an IT Consultant
Journey to Becoming an IT Consultantheraflux
 
Risk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational ApproachRisk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational ApproachGraydon McKee
 
Client presentation
Client presentationClient presentation
Client presentationJim Sleith
 
Euler Hermes At A Glance
Euler Hermes At A GlanceEuler Hermes At A Glance
Euler Hermes At A GlanceDrew Johnson
 
Treasury Risk Management and Regulations: Tough Questions for Treasurers
Treasury Risk Management and Regulations: Tough Questions for TreasurersTreasury Risk Management and Regulations: Tough Questions for Treasurers
Treasury Risk Management and Regulations: Tough Questions for TreasurersFIS
 
How to turn an incident into an opportunity for your business through effect...
 How to turn an incident into an opportunity for your business through effect... How to turn an incident into an opportunity for your business through effect...
How to turn an incident into an opportunity for your business through effect...PECB
 
Proactive crisis management: Expecting the unexpected
Proactive crisis management: Expecting the unexpectedProactive crisis management: Expecting the unexpected
Proactive crisis management: Expecting the unexpectedOsler, Hoskin & Harcourt LLP
 
24/7 safety building an incident injury free safety culture
24/7 safety building an incident injury free safety culture 24/7 safety building an incident injury free safety culture
24/7 safety building an incident injury free safety culture Clinton Gray, MBA
 
Incident & injury free electric power presentation 3 19-11
Incident & injury free electric power presentation 3 19-11Incident & injury free electric power presentation 3 19-11
Incident & injury free electric power presentation 3 19-11NAES Corporation
 
The Journey Towards Incident & Injury Free - One Contractor's Experience
The Journey Towards Incident & Injury Free - One Contractor's ExperienceThe Journey Towards Incident & Injury Free - One Contractor's Experience
The Journey Towards Incident & Injury Free - One Contractor's ExperienceNAES Corporation
 
How well are you managing risk
How well are you managing riskHow well are you managing risk
How well are you managing riskGregg Barrett
 
2019 06-law-4618-p-tipsin5 minutes-r9
2019 06-law-4618-p-tipsin5 minutes-r92019 06-law-4618-p-tipsin5 minutes-r9
2019 06-law-4618-p-tipsin5 minutes-r9AtReo1
 

Was ist angesagt? (16)

Building a Business Case for DAM
Building a Business Case for DAMBuilding a Business Case for DAM
Building a Business Case for DAM
 
Journey to Becoming an IT Consultant
Journey to Becoming an IT ConsultantJourney to Becoming an IT Consultant
Journey to Becoming an IT Consultant
 
Risk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational ApproachRisk Management: A Holistic Organizational Approach
Risk Management: A Holistic Organizational Approach
 
How to Avoid the Sting of Unknown Risks
How to Avoid the Sting of Unknown RisksHow to Avoid the Sting of Unknown Risks
How to Avoid the Sting of Unknown Risks
 
Client presentation
Client presentationClient presentation
Client presentation
 
FSLAA implementation impacts snippet
FSLAA implementation impacts snippetFSLAA implementation impacts snippet
FSLAA implementation impacts snippet
 
Euler Hermes At A Glance
Euler Hermes At A GlanceEuler Hermes At A Glance
Euler Hermes At A Glance
 
Treasury Risk Management and Regulations: Tough Questions for Treasurers
Treasury Risk Management and Regulations: Tough Questions for TreasurersTreasury Risk Management and Regulations: Tough Questions for Treasurers
Treasury Risk Management and Regulations: Tough Questions for Treasurers
 
How to turn an incident into an opportunity for your business through effect...
 How to turn an incident into an opportunity for your business through effect... How to turn an incident into an opportunity for your business through effect...
How to turn an incident into an opportunity for your business through effect...
 
2018 bks rms update
2018 bks rms update2018 bks rms update
2018 bks rms update
 
Proactive crisis management: Expecting the unexpected
Proactive crisis management: Expecting the unexpectedProactive crisis management: Expecting the unexpected
Proactive crisis management: Expecting the unexpected
 
24/7 safety building an incident injury free safety culture
24/7 safety building an incident injury free safety culture 24/7 safety building an incident injury free safety culture
24/7 safety building an incident injury free safety culture
 
Incident & injury free electric power presentation 3 19-11
Incident & injury free electric power presentation 3 19-11Incident & injury free electric power presentation 3 19-11
Incident & injury free electric power presentation 3 19-11
 
The Journey Towards Incident & Injury Free - One Contractor's Experience
The Journey Towards Incident & Injury Free - One Contractor's ExperienceThe Journey Towards Incident & Injury Free - One Contractor's Experience
The Journey Towards Incident & Injury Free - One Contractor's Experience
 
How well are you managing risk
How well are you managing riskHow well are you managing risk
How well are you managing risk
 
2019 06-law-4618-p-tipsin5 minutes-r9
2019 06-law-4618-p-tipsin5 minutes-r92019 06-law-4618-p-tipsin5 minutes-r9
2019 06-law-4618-p-tipsin5 minutes-r9
 

Ähnlich wie Security Compliance Tackled by Taylor Hersom

Riskpro company introduction 2013
Riskpro company introduction 2013Riskpro company introduction 2013
Riskpro company introduction 2013Nidhi Gupta
 
Riskpro company introduction 2013
Riskpro company introduction 2013Riskpro company introduction 2013
Riskpro company introduction 2013Nidhi Gupta
 
Riskpro brief introduction
Riskpro brief introductionRiskpro brief introduction
Riskpro brief introductionNidhi Gupta
 
10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber RiskMark Gibson
 
PCI Amsterdam: 27.11.2014: Rocky-Road-to-PCI-Compliance
PCI Amsterdam: 27.11.2014: Rocky-Road-to-PCI-CompliancePCI Amsterdam: 27.11.2014: Rocky-Road-to-PCI-Compliance
PCI Amsterdam: 27.11.2014: Rocky-Road-to-PCI-Compliancekhalavak
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013Nidhi Gupta
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013Nidhi Gupta
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksAronson LLC
 
WEBINAR: Enhance your perspective of vendor risk with ServiceNow
WEBINAR: Enhance your perspective of vendor risk with ServiceNowWEBINAR: Enhance your perspective of vendor risk with ServiceNow
WEBINAR: Enhance your perspective of vendor risk with ServiceNowIceberg Networks Corporation
 
Virtual Risk Officer / Virtual Risk Advisor
Virtual Risk Officer / Virtual Risk AdvisorVirtual Risk Officer / Virtual Risk Advisor
Virtual Risk Officer / Virtual Risk AdvisorGrayline
 
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016CBIZ, Inc.
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey aheadKevin Duffey
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Accounting_Whitepapers
 
Riskpro capital markets industry 2013
Riskpro capital markets industry 2013Riskpro capital markets industry 2013
Riskpro capital markets industry 2013Nidhi Gupta
 
Cybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness AssessmentCybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness AssessmentCBIZ, Inc.
 

Ähnlich wie Security Compliance Tackled by Taylor Hersom (20)

Riskpro company introduction 2013
Riskpro company introduction 2013Riskpro company introduction 2013
Riskpro company introduction 2013
 
Riskpro company introduction 2013
Riskpro company introduction 2013Riskpro company introduction 2013
Riskpro company introduction 2013
 
Riskpro brief introduction
Riskpro brief introductionRiskpro brief introduction
Riskpro brief introduction
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk10 Questions for the C-Suite in Assessing Cyber Risk
10 Questions for the C-Suite in Assessing Cyber Risk
 
PCI Amsterdam: 27.11.2014: Rocky-Road-to-PCI-Compliance
PCI Amsterdam: 27.11.2014: Rocky-Road-to-PCI-CompliancePCI Amsterdam: 27.11.2014: Rocky-Road-to-PCI-Compliance
PCI Amsterdam: 27.11.2014: Rocky-Road-to-PCI-Compliance
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
 
WEBINAR: Enhance your perspective of vendor risk with ServiceNow
WEBINAR: Enhance your perspective of vendor risk with ServiceNowWEBINAR: Enhance your perspective of vendor risk with ServiceNow
WEBINAR: Enhance your perspective of vendor risk with ServiceNow
 
Virtual Risk Officer / Virtual Risk Advisor
Virtual Risk Officer / Virtual Risk AdvisorVirtual Risk Officer / Virtual Risk Advisor
Virtual Risk Officer / Virtual Risk Advisor
 
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey ahead
 
NRS-overview-brochure
NRS-overview-brochureNRS-overview-brochure
NRS-overview-brochure
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
Riskpro capital markets industry 2013
Riskpro capital markets industry 2013Riskpro capital markets industry 2013
Riskpro capital markets industry 2013
 
Riskpro capital markets industry 2013
Riskpro capital markets industry 2013Riskpro capital markets industry 2013
Riskpro capital markets industry 2013
 
Cybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness AssessmentCybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness Assessment
 

Mehr von SaraPia5

Let's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
Let's TOC: Navigate the Cybersecurity Conversation with Dominique SingerLet's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
Let's TOC: Navigate the Cybersecurity Conversation with Dominique SingerSaraPia5
 
AppGate Getting Started Resources for Telarus Partners
AppGate Getting Started Resources for Telarus PartnersAppGate Getting Started Resources for Telarus Partners
AppGate Getting Started Resources for Telarus PartnersSaraPia5
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?SaraPia5
 
Return to Work Beyond Contact Tracing with Everbridge
Return to Work Beyond Contact Tracing with EverbridgeReturn to Work Beyond Contact Tracing with Everbridge
Return to Work Beyond Contact Tracing with EverbridgeSaraPia5
 
TIC-TOC: How to Manage Critical Events and Return to Work After a Pandemic wi...
TIC-TOC: How to Manage Critical Events and Return to Work After a Pandemic wi...TIC-TOC: How to Manage Critical Events and Return to Work After a Pandemic wi...
TIC-TOC: How to Manage Critical Events and Return to Work After a Pandemic wi...SaraPia5
 
TIC-TOC: Using employee satisfaction to drive customer satisfaction with Olum...
TIC-TOC: Using employee satisfaction to drive customer satisfaction with Olum...TIC-TOC: Using employee satisfaction to drive customer satisfaction with Olum...
TIC-TOC: Using employee satisfaction to drive customer satisfaction with Olum...SaraPia5
 
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingTIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingSaraPia5
 
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingTIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingSaraPia5
 
How to be a Security Wingman by Dominique Singer
How to be a Security Wingman by Dominique Singer How to be a Security Wingman by Dominique Singer
How to be a Security Wingman by Dominique Singer SaraPia5
 
Creating Your Top Team - How to Find Your Goose by Richard Murray
Creating Your Top Team - How to Find Your Goose by Richard MurrayCreating Your Top Team - How to Find Your Goose by Richard Murray
Creating Your Top Team - How to Find Your Goose by Richard MurraySaraPia5
 
The Strategy of Platforms
The Strategy of PlatformsThe Strategy of Platforms
The Strategy of PlatformsSaraPia5
 
How to Create a VoIP-Ready Network.
How to Create a VoIP-Ready Network.How to Create a VoIP-Ready Network.
How to Create a VoIP-Ready Network.SaraPia5
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...SaraPia5
 
Finding Work Life Balance with Ron McNab
Finding Work Life Balance with Ron McNabFinding Work Life Balance with Ron McNab
Finding Work Life Balance with Ron McNabSaraPia5
 
Amy Bailey, VP of Marketing, presenting Telarus Loyalty Program
Amy Bailey, VP of Marketing, presenting Telarus Loyalty ProgramAmy Bailey, VP of Marketing, presenting Telarus Loyalty Program
Amy Bailey, VP of Marketing, presenting Telarus Loyalty ProgramSaraPia5
 
TIC-TOC: Legal Issues you may not be thinking about with Telarus legal counse...
TIC-TOC: Legal Issues you may not be thinking about with Telarus legal counse...TIC-TOC: Legal Issues you may not be thinking about with Telarus legal counse...
TIC-TOC: Legal Issues you may not be thinking about with Telarus legal counse...SaraPia5
 
Growing your Cloud Practice by Josh Lupresto VP Engineering
Growing your Cloud Practice by Josh Lupresto VP EngineeringGrowing your Cloud Practice by Josh Lupresto VP Engineering
Growing your Cloud Practice by Josh Lupresto VP EngineeringSaraPia5
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...SaraPia5
 
Linkedin Tips and Tricks by Sara Piña, and Patrick Oborn | Telarus
Linkedin Tips and Tricks by Sara Piña, and Patrick Oborn | TelarusLinkedin Tips and Tricks by Sara Piña, and Patrick Oborn | Telarus
Linkedin Tips and Tricks by Sara Piña, and Patrick Oborn | TelarusSaraPia5
 
The Role of AI in CX by Sam Nelson, Sr. Director, Channels | Talkdesk
The Role of AI in CX by Sam Nelson, Sr. Director, Channels | TalkdeskThe Role of AI in CX by Sam Nelson, Sr. Director, Channels | Talkdesk
The Role of AI in CX by Sam Nelson, Sr. Director, Channels | TalkdeskSaraPia5
 

Mehr von SaraPia5 (20)

Let's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
Let's TOC: Navigate the Cybersecurity Conversation with Dominique SingerLet's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
Let's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
 
AppGate Getting Started Resources for Telarus Partners
AppGate Getting Started Resources for Telarus PartnersAppGate Getting Started Resources for Telarus Partners
AppGate Getting Started Resources for Telarus Partners
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
 
Return to Work Beyond Contact Tracing with Everbridge
Return to Work Beyond Contact Tracing with EverbridgeReturn to Work Beyond Contact Tracing with Everbridge
Return to Work Beyond Contact Tracing with Everbridge
 
TIC-TOC: How to Manage Critical Events and Return to Work After a Pandemic wi...
TIC-TOC: How to Manage Critical Events and Return to Work After a Pandemic wi...TIC-TOC: How to Manage Critical Events and Return to Work After a Pandemic wi...
TIC-TOC: How to Manage Critical Events and Return to Work After a Pandemic wi...
 
TIC-TOC: Using employee satisfaction to drive customer satisfaction with Olum...
TIC-TOC: Using employee satisfaction to drive customer satisfaction with Olum...TIC-TOC: Using employee satisfaction to drive customer satisfaction with Olum...
TIC-TOC: Using employee satisfaction to drive customer satisfaction with Olum...
 
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingTIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
 
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingTIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
 
How to be a Security Wingman by Dominique Singer
How to be a Security Wingman by Dominique Singer How to be a Security Wingman by Dominique Singer
How to be a Security Wingman by Dominique Singer
 
Creating Your Top Team - How to Find Your Goose by Richard Murray
Creating Your Top Team - How to Find Your Goose by Richard MurrayCreating Your Top Team - How to Find Your Goose by Richard Murray
Creating Your Top Team - How to Find Your Goose by Richard Murray
 
The Strategy of Platforms
The Strategy of PlatformsThe Strategy of Platforms
The Strategy of Platforms
 
How to Create a VoIP-Ready Network.
How to Create a VoIP-Ready Network.How to Create a VoIP-Ready Network.
How to Create a VoIP-Ready Network.
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
 
Finding Work Life Balance with Ron McNab
Finding Work Life Balance with Ron McNabFinding Work Life Balance with Ron McNab
Finding Work Life Balance with Ron McNab
 
Amy Bailey, VP of Marketing, presenting Telarus Loyalty Program
Amy Bailey, VP of Marketing, presenting Telarus Loyalty ProgramAmy Bailey, VP of Marketing, presenting Telarus Loyalty Program
Amy Bailey, VP of Marketing, presenting Telarus Loyalty Program
 
TIC-TOC: Legal Issues you may not be thinking about with Telarus legal counse...
TIC-TOC: Legal Issues you may not be thinking about with Telarus legal counse...TIC-TOC: Legal Issues you may not be thinking about with Telarus legal counse...
TIC-TOC: Legal Issues you may not be thinking about with Telarus legal counse...
 
Growing your Cloud Practice by Josh Lupresto VP Engineering
Growing your Cloud Practice by Josh Lupresto VP EngineeringGrowing your Cloud Practice by Josh Lupresto VP Engineering
Growing your Cloud Practice by Josh Lupresto VP Engineering
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
 
Linkedin Tips and Tricks by Sara Piña, and Patrick Oborn | Telarus
Linkedin Tips and Tricks by Sara Piña, and Patrick Oborn | TelarusLinkedin Tips and Tricks by Sara Piña, and Patrick Oborn | Telarus
Linkedin Tips and Tricks by Sara Piña, and Patrick Oborn | Telarus
 
The Role of AI in CX by Sam Nelson, Sr. Director, Channels | Talkdesk
The Role of AI in CX by Sam Nelson, Sr. Director, Channels | TalkdeskThe Role of AI in CX by Sam Nelson, Sr. Director, Channels | Talkdesk
The Role of AI in CX by Sam Nelson, Sr. Director, Channels | Talkdesk
 

Kürzlich hochgeladen

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Security Compliance Tackled by Taylor Hersom

  • 1.
  • 2. Presented by: Taylor Hersom RSI’s ChiefSecurityOfficer Presented by: David Burgeson RSI’s ChiefOperatingOfficer
  • 3. Risk Management Is An Arduous Journey • Cyber regulations are everywhere • Data breaches are crippling organizations • Everyone is offering the same risk service • The bad guys are faster than the good guys • Third Party or Hiring In-House = Expensive • Companies have the wrong approach
  • 4. 4 The Current Compliance & Cyber Risk Landscape
  • 5. 5 What if YOU could assist in The Compliance/Cyber Risk Journey? Adapt To Your Customer’s Needs Help Your Customers Take Control Become A Security Thought Leader Increase Your Overall Commissions
  • 6. RSI PROUDLY PRESENTS: ➢ ASSESSMENT BASED ON ANY MAJOR REGULATION(S) ➢ SIMPLICITY IN MIND ➢ TAKES LESS TIME AND COSTS FAR LESS THAN COMPETITORS ➢ COMPREHENSIVE RISK SCORES ➢ AUDIT READY RISK REPORT WITH ROADMAP TO REMEDIATION ➢ SINGLE SAAS PLATFORM TO MANAGE RISK ENTERPRISE-WIDE ➢ PERSONALIZED DASHBOARD FOR CYBER RISK MANAGEMENT ➢ ABILITY TO ASSIGN RISKS TO RESPONSIBLE PARTIES IN THE ORGANIZATION ➢ TOOL INTELLIGENTLY BUILDS UPON PROGRESS W/ AUDIT TRAIL ➢ COMPLIANCE ACHIEVED JUST BY USING CYBERCOMPASS TOOL ➢ YOUR CLIENTS CAN SELF ASSESS THROUGHOUT THE YEAR ➢ CYBERCOMPASS ADAPTS TO EVOLVING REGULATIONS AND FRAMEWORKS ➢ CONTINUOUS SUPPORT DURING REMEDIATION WITH FORMAL ATTESTATION FROM RSI ➢ VIRTUAL CISO TEAM AT YOUR CLIENT’S FINGERTIPS FOR INDEFINITE CYBER LEADERSHIP SUPPORT IDENTIFY YOUR RISKS TAKE ACTION PEACE OF MIND
  • 7. The CyberCompassTM Difference TIME 80+% Faster. In some cases, just a week to complete. Typically 2-6 months, depending on locations. Some last 1 yr+. REPORTING Compliance Reports are automatically generated in seconds. Manually written with templates. Takes weeks to complete. COST 65%+ of typical costs. Affordable Package options from $600/month Costly with heavy Professional Services Charges from $25K-$200K+ MITIGATION A roadmap to mitigate compliance and IT risks with vCISO to assist. Usually little to none. Invoice & Leave approach. - TELARUS PARTNERS Partners are now part of the compliance process with mitigation. Boxed out by the consultant and competing against them. - Others
  • 8. Powerful For Us, Simple For Your Customers Categorically Organized Based On Customer’s Objectives Tool designed to easily incorporate new frameworks. Conducting Interviews Is Beautifully Simple
  • 9. Proprietary Assessment Capabilities Requirements Re-Written to Be Easily Understood Designed to Be Simple to Answer. Period. Include audit evidence, screenshots, or flag for later Tied to specific regulation requirements
  • 10. 10 Automated Risk Report Know WHAT Your Risk Is… HOW To Address It. Scores Your Risks Based on Likelihood and Impact Ranked Risks Give You A Roadmap for Addressment Additional Revenue Opportunities for Partners!
  • 11. Comprehensive Risk Dashboard Understand your Risk Level 1 1 Manage Multiple Assessments 2 2 Know the Important Issues In Your Company 3 3 Conduct and Track Employee Cyber Training 4 4 Maintain IT Policies & Procedures 5 5 Track Your Vendors6 6 Cyber Resources At Your Fingertips 7 7
  • 12. Four Packages to Choose From: vCISO Professional Services Our team can assistyour client in outsourcing their Cyber Risk Management Self Assessment+ • Self-Conducted Compliance Assessment • Onboarding Support • SaaS Tool Subscription 3 Remote Assessment • Remote Compliance Assessment • Remote vCISO Support • SaaS Tool Subscription 1 Onsite Assessment • OnsiteCompliance Assessment • OnsiteCISO Support • SaaS Tool Subscription 2 Enterprise Onboarding • Training Programfor Adoption of Cyber Risk Management Tool • SaaS Subscription 4
  • 13. Goodbye Invoice and Leave. Hello Cyber Confidence. Contact us: (512) 600-3200 cybercompass@rsitex.com