SlideShare a Scribd company logo
1 of 2
Download to read offline
I+ Information Management Services


                         SingerLewak’s I+DIAGNOSTIC
                Helping Businesses turn IT into a Valued Asset

What is the SingerLewak I+Diagnostic?
The I+Diagnostic is a custom-tailored, risk-oriented, objective assessment of a business’
information systems.
This service is designed to give a company’s executive team candid feedback regarding
the strengths, weaknesses, and vulnerabilities in their business’ information systems – and
to give proactive, and risk-mitigating recommendations for improvement.
It is the first step in helping management leverage VALUE from IT.


Why should a business consider a SingerLewak I+Diagnostic?
Most businesses are vulnerable from the very state of their information systems, data,
policies and staff – and may not realize just how vulnerable their systems are.
In fact, most growing businesses are exposed in the areas of information protection,
disaster preparedness, and network/communication infrastructures – among other areas.
Executives desire that their IT environment provide control and value. Not chaos. Without
control, business leaders lose sleep, lose an edge, and often don’t know where to turn.
We’re here to help.


How is the Diagnostic performed?
    1. Measure the “Tone from the top”:
            We ask management what concerns them about their systems, software,
            reporting, and IT staff.
    2. Observation/inquiry/analysis:
             We investigate the computing environment and staff in as many as 9 areas
             (see attached).
    3. Assessment Report to management:
             We report to management, illustrating key observations, focusing on
             vulnerabilities.
    4. Action plan:
              We develop a critical action path of specific recommendations to fix
              vulnerabilities – and build a foundation for the future.
Continued…
SingerLewak’s I+Diagnostic
    Continued from Page 1



                    Systems Categories covered by the I+Diagnostic:
The areas below comprise the categories we can look into when we perform an I+Diagnostic. Not
every category is assessed for every business – it depends on management’s objectives. Which of
these would be valuable to investigate in your company?
      1. INFORMATION SECURITY – INSIDE AND OUT:
                  How secure is the business’ information from internet-borne threats?
                  Is the business’ sensitive data secure from harm, theft or misuse by employees?
      2. DISASTER PREPAREDNESS:
                  Can the business information systems survive a natural or unintended “disaster”?
                  How long would it take to resume operations and systems resources?
      3. EMPLOYEE DIGITAL BEHAVIOR = THREATS TO SENSITIVE INFORMATION:
                  Does the behavior of employees on the web, and in email, put the company at risk?
                  Are employees given too much freedom to access to systems and key information?
      4. INFORMATION TECHNOLOGY PLANNING – AN ACHILLES HEEL, OR AN ASSET?:
                  Is IT strategy in harmony with the strategic business plan?
                  How well does management actually “manage” the IT function?
      5. NETWORK ARCHITECTURE AND DESIGN:
                  Is the network effectively designed, and can it accommodate future needs?
                  Have the network design, configuration and practices been documented in
                  anticipation of intended (or unintended) changes and consequences?
      6. INFORMATION MANAGEMENT PRACTICES:
                  Is data stored, organized, secured, retained, and destroyed prudently?
                  Is private data protected in a manner to satisfy regulatory compliance?
                  Is trade secret and confidential information adequately safeguarded from theft?
      7. SOFTWARE, WORK FLOWS, AND THE USE OF INFORMATION:
                  Does the mix of business software deliver efficiencies now - and in the future?
                  Does the existing software support the business’ activities and work flows?
                  Is information provided to those who need it? Is it timely? Accurate? Valuable?
      8. IT STAFF CAPABILITIES AND SUCCESSION PLANNING:
                  Are the IT staff and/or outside IT providers competent?
                  Are procedures in place to aid in any staff transition or loss?



                                     Rick Mark, Senior Manager - Enterprise Risk Management Services
                                     21550 Oxnard Street, Ste. 1000. Woodland Hills, CA 91367
                                     T. 818.251.1323/ rmark@singerlewak.com

                                                                                                       2

More Related Content

What's hot

System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)BPalmer13
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael Priyanka Aash
 
Security Lifecycle Management
Security Lifecycle ManagementSecurity Lifecycle Management
Security Lifecycle ManagementBarry Caplin
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
information security technology
information security technologyinformation security technology
information security technologygarimasagar
 
Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001Donald E. Hester
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015Capgemini
 
Mapping Application Security to Business Value - Redspin Information Security
Mapping Application Security to Business Value - Redspin Information SecurityMapping Application Security to Business Value - Redspin Information Security
Mapping Application Security to Business Value - Redspin Information SecurityRedspin, Inc.
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security FrameworkNada G.Youssef
 
Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Redspin, Inc.
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummiesIvo Depoorter
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...The University of Texas (UTRGV)
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)ChristopherAntonius
 
mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15Thomas McDonald
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
SolarWinds IT Security Survey - February 2013
SolarWinds IT Security Survey - February 2013SolarWinds IT Security Survey - February 2013
SolarWinds IT Security Survey - February 2013SolarWinds
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 

What's hot (20)

System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael
 
Security Lifecycle Management
Security Lifecycle ManagementSecurity Lifecycle Management
Security Lifecycle Management
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
information security technology
information security technologyinformation security technology
information security technology
 
Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
Mapping Application Security to Business Value - Redspin Information Security
Mapping Application Security to Business Value - Redspin Information SecurityMapping Application Security to Business Value - Redspin Information Security
Mapping Application Security to Business Value - Redspin Information Security
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
IT Position of Trust Designation
IT Position of Trust DesignationIT Position of Trust Designation
IT Position of Trust Designation
 
Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummies
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
 
mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Information security
Information securityInformation security
Information security
 
SolarWinds IT Security Survey - February 2013
SolarWinds IT Security Survey - February 2013SolarWinds IT Security Survey - February 2013
SolarWinds IT Security Survey - February 2013
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 

Similar to I+Diagnostic Overview

I+ Information Management
I+ Information ManagementI+ Information Management
I+ Information ManagementRickMark
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsHappiest Minds Technologies
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai360 BSI
 
Transforming Information Security: Designing a State-of-the-Art Extended Team
Transforming Information Security: Designing a State-of-the-Art Extended TeamTransforming Information Security: Designing a State-of-the-Art Extended Team
Transforming Information Security: Designing a State-of-the-Art Extended TeamEMC
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE360 BSI
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE360 BSI
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...360 BSI
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Livingstone Advisory
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh ShanmughanathanSharath Kumar
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
Steve alameda burlingame ca
Steve alameda   burlingame caSteve alameda   burlingame ca
Steve alameda burlingame caSteve Alameda
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionGianmarco Ferri
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data LeakagePatty Buckley
 
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...subramanian K
 
Build a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramBuild a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramInfo-Tech Research Group
 

Similar to I+Diagnostic Overview (20)

I+ Information Management
I+ Information ManagementI+ Information Management
I+ Information Management
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
 
Transforming Information Security: Designing a State-of-the-Art Extended Team
Transforming Information Security: Designing a State-of-the-Art Extended TeamTransforming Information Security: Designing a State-of-the-Art Extended Team
Transforming Information Security: Designing a State-of-the-Art Extended Team
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
 
S36169184
S36169184S36169184
S36169184
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
 
Decode_Portfolio2016
Decode_Portfolio2016Decode_Portfolio2016
Decode_Portfolio2016
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Steve alameda burlingame ca
Steve alameda   burlingame caSteve alameda   burlingame ca
Steve alameda burlingame ca
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtection
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
 
Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
 
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
 
Build a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramBuild a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management Program
 

I+Diagnostic Overview

  • 1. I+ Information Management Services SingerLewak’s I+DIAGNOSTIC Helping Businesses turn IT into a Valued Asset What is the SingerLewak I+Diagnostic? The I+Diagnostic is a custom-tailored, risk-oriented, objective assessment of a business’ information systems. This service is designed to give a company’s executive team candid feedback regarding the strengths, weaknesses, and vulnerabilities in their business’ information systems – and to give proactive, and risk-mitigating recommendations for improvement. It is the first step in helping management leverage VALUE from IT. Why should a business consider a SingerLewak I+Diagnostic? Most businesses are vulnerable from the very state of their information systems, data, policies and staff – and may not realize just how vulnerable their systems are. In fact, most growing businesses are exposed in the areas of information protection, disaster preparedness, and network/communication infrastructures – among other areas. Executives desire that their IT environment provide control and value. Not chaos. Without control, business leaders lose sleep, lose an edge, and often don’t know where to turn. We’re here to help. How is the Diagnostic performed? 1. Measure the “Tone from the top”: We ask management what concerns them about their systems, software, reporting, and IT staff. 2. Observation/inquiry/analysis: We investigate the computing environment and staff in as many as 9 areas (see attached). 3. Assessment Report to management: We report to management, illustrating key observations, focusing on vulnerabilities. 4. Action plan: We develop a critical action path of specific recommendations to fix vulnerabilities – and build a foundation for the future. Continued…
  • 2. SingerLewak’s I+Diagnostic Continued from Page 1 Systems Categories covered by the I+Diagnostic: The areas below comprise the categories we can look into when we perform an I+Diagnostic. Not every category is assessed for every business – it depends on management’s objectives. Which of these would be valuable to investigate in your company? 1. INFORMATION SECURITY – INSIDE AND OUT: How secure is the business’ information from internet-borne threats? Is the business’ sensitive data secure from harm, theft or misuse by employees? 2. DISASTER PREPAREDNESS: Can the business information systems survive a natural or unintended “disaster”? How long would it take to resume operations and systems resources? 3. EMPLOYEE DIGITAL BEHAVIOR = THREATS TO SENSITIVE INFORMATION: Does the behavior of employees on the web, and in email, put the company at risk? Are employees given too much freedom to access to systems and key information? 4. INFORMATION TECHNOLOGY PLANNING – AN ACHILLES HEEL, OR AN ASSET?: Is IT strategy in harmony with the strategic business plan? How well does management actually “manage” the IT function? 5. NETWORK ARCHITECTURE AND DESIGN: Is the network effectively designed, and can it accommodate future needs? Have the network design, configuration and practices been documented in anticipation of intended (or unintended) changes and consequences? 6. INFORMATION MANAGEMENT PRACTICES: Is data stored, organized, secured, retained, and destroyed prudently? Is private data protected in a manner to satisfy regulatory compliance? Is trade secret and confidential information adequately safeguarded from theft? 7. SOFTWARE, WORK FLOWS, AND THE USE OF INFORMATION: Does the mix of business software deliver efficiencies now - and in the future? Does the existing software support the business’ activities and work flows? Is information provided to those who need it? Is it timely? Accurate? Valuable? 8. IT STAFF CAPABILITIES AND SUCCESSION PLANNING: Are the IT staff and/or outside IT providers competent? Are procedures in place to aid in any staff transition or loss? Rick Mark, Senior Manager - Enterprise Risk Management Services 21550 Oxnard Street, Ste. 1000. Woodland Hills, CA 91367 T. 818.251.1323/ rmark@singerlewak.com   2