Information Security Management Made Easy
2013 Aujas. All Rights Reserved. This document and its contents are STRICTLY PRIVATE & CONFIDENTIAL and should not be reproduced in any form or disclosed to any third party, whether in whole or part, without obtaining the prior written consent of Aujas.
Comprehensive IT security support structure
Trained, certified, experienced VSO team
Consistent service methodologies with: ◦ Comprehensive repeatable delivery framework ◦ Standardized practices ◦ Specific skill sets available based on requirements
Flexibility to suit full/part time requirements
Strategic, tactical and operational skills in a standardized delivery framework 2013 Aujas. All Rights Reserved. This document and its contents are STRICTLY PRIVATE & CONFIDENTIAL and should not be reproduced in any form or disclosed to any third party, whether in whole or part, without obtaining the prior written consent of Aujas.
2
Strategy & Design
•Design/update information security policies, processes, programs •Design governance, risk, compliance management frameworks
•Interpreting & applying appropriate legal/regulatory requirements
Aujas VSO
Control & Integration
•Design governance, risk, compliance management frameworks •Conduct risk assessments, control effectiveness evaluations •Draft remediation control strategies and assist in their implementation
•Sustenance services for IT security operations
For more information about this service, visit Virtual Security Office
Sustenance & Optimization
•DLP sustenance for incident management •GRC technology management
2013 Aujas. All Rights Reserved. This document and its contents are STRICTLY PRIVATE & CONFIDENTIAL and should not be reproduced in any form or disclosed to any third party, whether in whole or part, without obtaining the prior written consent of Aujas.
3