SlideShare a Scribd company logo
1 of 10
Download to read offline
Henrietta.Boulton@Tuimarine.com




Business and Technology Risk Consulting Services
Sunera Snapshot
      Professional consultancy focused on regulatory compliance,
        information security, internal audit, and information technology
        advisory services

      Founded by former Big-4 risk partners and professionals

      Delivered more than 1500 projects for over 350 clients across a
        broad spectrum of industries

      Employ over 100 full-time professionals in twelve offices across
        the United States and Canada.

      PCI Qualified Security Assessor (QSA) and Approved Scanning
        Vendor (ASV)

      Registered with NASBA to offer CPE’s for our Internal Audit training
        courses

      Certified integration partner for leading continuous controls monitoring
        solutions, including ACL, ERP GRC




                                                                                  2
Internal Audit Services
Business Audit                                IT Audit
   Outsourcing & Co-sourcing                  IT Risk & Governance (CobiT) Review
   Enterprise Risk Assessment                 ERP Configurable Controls Optimization,
   Audit Planning                              Design & Testing
   Operational & Business Process Audit       ERP Security & Segregation of Duties
   Store, Branch & Franchise Audit             Assessment
   Contract Compliance Audit                  ERP Pre & Post Integration Review
   Quality/Peer Review                        SOX ITGCs & Application Controls Testing
   ACL Training                               Information Security and Data Privacy
   Internal Auditing Training (CPE)            Assessment
                                               Data Integrity Analysis


Continuous Monitoring                         Benefits
 ACL, SAP GRC, Approva BizRights, &           Enhance Internal Audit’s profile and impact
  Lumigent Integration                          on the organization
 Project Management                           Increase audit efficiencies and risk
 Process Controls & SoD Rule Configuration     coverage
 Quality Assurance, Improvement & Training    Overcome resource capacity and skills
                                                constraints



                                                                                              3
Compliance Services
Regulatory Compliance                           Sarbanes-Oxley
 Financial Reporting Regulations                Outsourcing & Co-sourcing
  (Sarbanes-Oxley § 404, C-SOX, & J-             Risk Assessment, Scoping & Materiality
  SOX)                                            Assistance
 Financial Services Regulations (GLBA,          Entity & Activity-Level Controls
  FDICIA, Basel II, Patriot Act, & Anti Money     Documentation & Testing Assistance
  Laundering)                                    IT Controls Documentation & Testing
 IT Standards (PCI, CobiT, ISO 17799, &         Controls Remediation Assistance
  SAS 70)                                        Self-Assessment Program Assistance
 Data Privacy (HIPAA, US Safe Harbor, EU        Project Management & Quality Assurance
  Directive 95/46/EC, PIPEDA)                    ICFR Sustainment & Rationalization

Anti Money Laundering                           Benefits
 AML Compliance Gap-Analysis                    Free-up management to focus on strategic
 AML Compliance Examination                      objectives
 Transaction Monitoring System                  Avoid scrutiny from the Board and
  Enhancement                                     regulators
 AML Compliance Training                        Minimize compliance costs and project
 Corporate Internal Investigation                delays
 Customer Identification Program



                                                                                             4
Information Security & Data Privacy Services
Information Security                            Data Privacy
   Risk Assessment                              Privacy Risk Assessment
   Vulnerability Assessment                     Policy & Procedure Development
   Physical Security Assessment                 Regulatory Compliance Assistance (GLBA,
   Penetration Testing                           Breach Notification, US Safe Harbor, EU
   Wireless Security Assessment                  Directive 95/46/EC, PIPEDA, HIPAA)
   Social Engineering                           Personally Identifiable Information (PII)
   Secure Source Code Analysis (SCA)             Discovery
   Web Application Security Assessment
   Security & Privacy Awareness Training
                                                PCI
                                                 On-site PCI Data Security Audit
Infrastructure Deployment
                                                 Remediation Assistance
 Secure Architecture Design                     Security Scan & Secure Code Audit
 Firewall & Intrusion Detection / Prevention
  System Design & Deployment                    Benefits
 High Availability Web Application
                                                 Prevent business disruptions, loss of data,
  Infrastructure Design & Deployment
                                                  and disclosure of sensitive information
 Systems Hardening
                                                  resulting from a security breach
 Identity Management
                                                 Avoid scrutiny from customers, business
 Logging Solutions
                                                  partners, the Board, and regulators


                                                                                                5
Information Technology Services
IT Consulting                                Business Continuity
   IT Organization Performance Assessment    Disaster Recovery Planning
   IT Strategy and Planning                  Business Impact Assessment
   Technology and IT Process Assessments     Business Continuity Plan Development
   Data Center Evaluation                    Business Continuity Plan Implementation
   ROI/Cost Analysis                          & Testing
   User Surveys                              Hurricane Preparedness Planning
   Software License Compliance               Data Storage Management
   Network Deployment                        Outsourcer SLA Development
   Project Management
   System Selection

Project Risk Management                      Benefits
 Project Risk Assessment                     Improve performance of the IT
 Root Cause Analysis                          organization, reduce costs, and achieve
 Project Oversight & Quality Assurance        returns from IT investments
 Contract Advisory                           Prevent business disruptions from IT
 Scope and Change Management                  failures
  Assessment                                  Deliver IT projects on-time, within budget
 ERP Controls Optimization Services           and achieve anticipated benefits



                                                                                            6
PCI Compliance Assistance Services
   Sunera provides a full-array of Payment Card Industry (PCI) consulting services designed to help
    both merchants and service providers achieve a cost effective solution to meet their specific
    payment card brand and level compliance requirements. Sunera is a PCI Qualified Security
    Assessor (QSA) and Approved Scanning Vendor (ASV). Our professionals have served all levels
    of merchants and service providers across a broad spectrum of sectors.

     – Annual Onsite Audit

     – Gap Analysis

     – Penetration Testing

     – Quarterly External Scanning

     – Remediation Assistance

     – Roadmap to Compliance

     – Self Assessment Questionnaire Completion

     – Web and Application Code Reviews

     – Franchise Compliance Programs

     – PCI Awareness and Training Programs




                                                                                                       7
Data Privacy and Forensic Assistance
   Privacy continues to be a significant business issue. It challenges organizations from a number of
    perspectives, including business risk, compliance, brand and reputation. Sunera has performed
    data privacy projects for large, international organizations impacted by almost every major privacy
    law in the United States, Canada and the European Union. We can help organizations effectively
    manage business risks and compliance issues relating to data privacy.

     – Corporate Privacy Framework

     – Principle-based Privacy Policy and Privacy Charter

     – Data Classification Model

     – Privacy Gap Analysis Validating Compliance with Applicable Regulations

     – Safe Harbor and EU DPA Registrations

     – Breach Notification Procedures

     – Web-based and Classroom Privacy Awareness Training

   Sunera is extensively familiar with, and maintains a library of privacy legislation requirements for
    the United States, Canada, Asia, and Europe. This library includes, but not limited to: HIPAA,
    Gramm-Leach-Bliley Act (GLBA), Children’s Online Privacy Protection Act (COPPA), Personal
    Information Protection and Electronic Documents Act (PIPEDA), Freedom of Information and
    Protection of Privacy Act (FOIP Act), UK Data Protection Act, EU Directive 95/46/EC, and US Safe
    Harbor.


                                                                                                      8
Our Values
Thought
                We deliver proactive, unbiased, tried and true guidance.
Leaders
                We deploy fulltime, trained and certified professionals with appropriate oversight
                utilizing proven, pragmatic methodologies to ensure our teams deliver consistent
Quality         results. Our professionals are accustomed to working together using standardized
                approaches and delivery methods resulting in a unified engagement team.
                We tailor each project to your specific needs. Our flexible, client-centric
Collaborative   approach enables us to deploy teams which complement our clients’ internal
                capabilities, address resource constraints and facilitate knowledge transfer.
                We readily adhere to your timetable, unlike “Big-4” firms which are burdened by
Responsive      onerous internal risk management practices.
                We are solution orientated. We are known for completing projects that achieve
Solution        anticipated benefits, on-time and within budget. Our rigorous project
Focused         management discipline combined with our finance and IT capabilities enables us to
                successfully deliver a wide-range of services.
Balanced        We recognize that “best practices” are not always appropriate and provide cost-
Perspective     effective solutions that find the right balance between risk and control.




                                                                                                  9
Learn more about Sunera




    Vancouver         Calgary

                                                 Toronto




                               Atlanta               Boston
            Phoenix
                      Dallas                     New York
                                            Charlotte
                                                                       Silvana Capaldi
                        Tampa                                 Account Executive, Client Services
                                                                   scapaldi@sunera.com
                                         Miami
                                                                      www.sunera.com




                                                                                                   10

More Related Content

What's hot

Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
Security_360_Marketing_Package
Security_360_Marketing_PackageSecurity_360_Marketing_Package
Security_360_Marketing_PackageRandy B.
 
The Challenges of Online Trust
The Challenges of Online TrustThe Challenges of Online Trust
The Challenges of Online TrustAlex Todd
 
Simple cloud security explanation
Simple cloud security explanationSimple cloud security explanation
Simple cloud security explanationindianadvisory
 
Building Bridges: Security Metrics to Narrow the Chasm Between Perception and...
Building Bridges: Security Metrics to Narrow the Chasm Between Perception and...Building Bridges: Security Metrics to Narrow the Chasm Between Perception and...
Building Bridges: Security Metrics to Narrow the Chasm Between Perception and...InnoTech
 
Security services mind map
Security services mind mapSecurity services mind map
Security services mind mapDavid Kennedy
 
Lumension LCRM - DSS @Vilnius 2010
Lumension LCRM - DSS @Vilnius 2010Lumension LCRM - DSS @Vilnius 2010
Lumension LCRM - DSS @Vilnius 2010Andris Soroka
 
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersDon’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersMichael Davis
 
Technical Security and Penetration Testing
Technical Security and Penetration TestingTechnical Security and Penetration Testing
Technical Security and Penetration TestingIT Governance Ltd
 
AdvisorAssist Presentation: Cloud Computing and Compliance For RIAs
AdvisorAssist Presentation:  Cloud Computing and Compliance For RIAsAdvisorAssist Presentation:  Cloud Computing and Compliance For RIAs
AdvisorAssist Presentation: Cloud Computing and Compliance For RIAsAdvisorAssist, LLC
 
SAP Compliance Management Demystified | Symmetry
SAP Compliance Management Demystified | SymmetrySAP Compliance Management Demystified | Symmetry
SAP Compliance Management Demystified | SymmetrySymmetry™
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationSyed Azher
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2Flaskdata.io
 
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATIONPCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATIONhimalya sharma
 
IBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance RequirementsIBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance RequirementsIBM Banking
 
5 Challenges to Continuous PCI DSS Compliance
5 Challenges to Continuous PCI DSS Compliance5 Challenges to Continuous PCI DSS Compliance
5 Challenges to Continuous PCI DSS ComplianceTripwire
 
Testing cloud services - EuroSTAR
Testing cloud services - EuroSTARTesting cloud services - EuroSTAR
Testing cloud services - EuroSTARJeroen Mengerink
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architectureVladimir Jirasek
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabiltiesSneha .
 

What's hot (20)

Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Security_360_Marketing_Package
Security_360_Marketing_PackageSecurity_360_Marketing_Package
Security_360_Marketing_Package
 
The Challenges of Online Trust
The Challenges of Online TrustThe Challenges of Online Trust
The Challenges of Online Trust
 
Simple cloud security explanation
Simple cloud security explanationSimple cloud security explanation
Simple cloud security explanation
 
Building Bridges: Security Metrics to Narrow the Chasm Between Perception and...
Building Bridges: Security Metrics to Narrow the Chasm Between Perception and...Building Bridges: Security Metrics to Narrow the Chasm Between Perception and...
Building Bridges: Security Metrics to Narrow the Chasm Between Perception and...
 
Real Time Risk Management
Real Time Risk ManagementReal Time Risk Management
Real Time Risk Management
 
Security services mind map
Security services mind mapSecurity services mind map
Security services mind map
 
Lumension LCRM - DSS @Vilnius 2010
Lumension LCRM - DSS @Vilnius 2010Lumension LCRM - DSS @Vilnius 2010
Lumension LCRM - DSS @Vilnius 2010
 
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersDon’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
 
Technical Security and Penetration Testing
Technical Security and Penetration TestingTechnical Security and Penetration Testing
Technical Security and Penetration Testing
 
AdvisorAssist Presentation: Cloud Computing and Compliance For RIAs
AdvisorAssist Presentation:  Cloud Computing and Compliance For RIAsAdvisorAssist Presentation:  Cloud Computing and Compliance For RIAs
AdvisorAssist Presentation: Cloud Computing and Compliance For RIAs
 
SAP Compliance Management Demystified | Symmetry
SAP Compliance Management Demystified | SymmetrySAP Compliance Management Demystified | Symmetry
SAP Compliance Management Demystified | Symmetry
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an Organisation
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2
 
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATIONPCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
 
IBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance RequirementsIBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance Requirements
 
5 Challenges to Continuous PCI DSS Compliance
5 Challenges to Continuous PCI DSS Compliance5 Challenges to Continuous PCI DSS Compliance
5 Challenges to Continuous PCI DSS Compliance
 
Testing cloud services - EuroSTAR
Testing cloud services - EuroSTARTesting cloud services - EuroSTAR
Testing cloud services - EuroSTAR
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architecture
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 

Similar to Sunera business & technology risk consulting services -slide share

Information Security Framework
Information Security FrameworkInformation Security Framework
Information Security Frameworkssuser65fa31
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
How It All Ties Together Sun Idm Roadshow For Sun
How It All Ties Together Sun Idm Roadshow For SunHow It All Ties Together Sun Idm Roadshow For Sun
How It All Ties Together Sun Idm Roadshow For Sunvijaychn
 
TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTri Phan
 
TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTuan Phan
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityJessica Santamaria
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityJessica Santamaria
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech
 
High Level Intro
High Level IntroHigh Level Intro
High Level Introfaisalsadaf
 
Automating Policy Compliance and IT Governance
Automating Policy Compliance and IT GovernanceAutomating Policy Compliance and IT Governance
Automating Policy Compliance and IT GovernanceSasha Nunke
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company ProfileKGanzy
 
Riskpro Information Risk Management
Riskpro Information Risk ManagementRiskpro Information Risk Management
Riskpro Information Risk ManagementManoj Jain
 
Network security in Chennai
Network security  in ChennaiNetwork security  in Chennai
Network security in ChennaiJoshuaMichael01
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown JewelsIBM Security
 

Similar to Sunera business & technology risk consulting services -slide share (20)

Information Security Framework
Information Security FrameworkInformation Security Framework
Information Security Framework
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
How It All Ties Together Sun Idm Roadshow For Sun
How It All Ties Together Sun Idm Roadshow For SunHow It All Ties Together Sun Idm Roadshow For Sun
How It All Ties Together Sun Idm Roadshow For Sun
 
TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTrustedAgent GRC for Public Sector
TrustedAgent GRC for Public Sector
 
TrustedAgent GRC for Public Sector
TrustedAgent GRC for Public SectorTrustedAgent GRC for Public Sector
TrustedAgent GRC for Public Sector
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Smart Ims Inc
Smart Ims IncSmart Ims Inc
Smart Ims Inc
 
Smart Ims Inc Pp
Smart Ims Inc PpSmart Ims Inc Pp
Smart Ims Inc Pp
 
Smart Ims Inc Pp
Smart Ims Inc PpSmart Ims Inc Pp
Smart Ims Inc Pp
 
SLVA - Developing an IT GRC Strategy
SLVA - Developing an IT GRC StrategySLVA - Developing an IT GRC Strategy
SLVA - Developing an IT GRC Strategy
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consulting
 
High Level Intro
High Level IntroHigh Level Intro
High Level Intro
 
Automating Policy Compliance and IT Governance
Automating Policy Compliance and IT GovernanceAutomating Policy Compliance and IT Governance
Automating Policy Compliance and IT Governance
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company Profile
 
Riskpro Information Risk Management
Riskpro Information Risk ManagementRiskpro Information Risk Management
Riskpro Information Risk Management
 
Network security in Chennai
Network security  in ChennaiNetwork security  in Chennai
Network security in Chennai
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels
 
Riskpro Information Risk Management
Riskpro Information Risk ManagementRiskpro Information Risk Management
Riskpro Information Risk Management
 
Riskpro information risk management
Riskpro information risk managementRiskpro information risk management
Riskpro information risk management
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Sunera business & technology risk consulting services -slide share

  • 2. Sunera Snapshot  Professional consultancy focused on regulatory compliance, information security, internal audit, and information technology advisory services  Founded by former Big-4 risk partners and professionals  Delivered more than 1500 projects for over 350 clients across a broad spectrum of industries  Employ over 100 full-time professionals in twelve offices across the United States and Canada.  PCI Qualified Security Assessor (QSA) and Approved Scanning Vendor (ASV)  Registered with NASBA to offer CPE’s for our Internal Audit training courses  Certified integration partner for leading continuous controls monitoring solutions, including ACL, ERP GRC 2
  • 3. Internal Audit Services Business Audit IT Audit  Outsourcing & Co-sourcing  IT Risk & Governance (CobiT) Review  Enterprise Risk Assessment  ERP Configurable Controls Optimization,  Audit Planning Design & Testing  Operational & Business Process Audit  ERP Security & Segregation of Duties  Store, Branch & Franchise Audit Assessment  Contract Compliance Audit  ERP Pre & Post Integration Review  Quality/Peer Review  SOX ITGCs & Application Controls Testing  ACL Training  Information Security and Data Privacy  Internal Auditing Training (CPE) Assessment  Data Integrity Analysis Continuous Monitoring Benefits  ACL, SAP GRC, Approva BizRights, &  Enhance Internal Audit’s profile and impact Lumigent Integration on the organization  Project Management  Increase audit efficiencies and risk  Process Controls & SoD Rule Configuration coverage  Quality Assurance, Improvement & Training  Overcome resource capacity and skills constraints 3
  • 4. Compliance Services Regulatory Compliance Sarbanes-Oxley  Financial Reporting Regulations  Outsourcing & Co-sourcing (Sarbanes-Oxley § 404, C-SOX, & J-  Risk Assessment, Scoping & Materiality SOX) Assistance  Financial Services Regulations (GLBA,  Entity & Activity-Level Controls FDICIA, Basel II, Patriot Act, & Anti Money Documentation & Testing Assistance Laundering)  IT Controls Documentation & Testing  IT Standards (PCI, CobiT, ISO 17799, &  Controls Remediation Assistance SAS 70)  Self-Assessment Program Assistance  Data Privacy (HIPAA, US Safe Harbor, EU  Project Management & Quality Assurance Directive 95/46/EC, PIPEDA)  ICFR Sustainment & Rationalization Anti Money Laundering Benefits  AML Compliance Gap-Analysis  Free-up management to focus on strategic  AML Compliance Examination objectives  Transaction Monitoring System  Avoid scrutiny from the Board and Enhancement regulators  AML Compliance Training  Minimize compliance costs and project  Corporate Internal Investigation delays  Customer Identification Program 4
  • 5. Information Security & Data Privacy Services Information Security Data Privacy  Risk Assessment  Privacy Risk Assessment  Vulnerability Assessment  Policy & Procedure Development  Physical Security Assessment  Regulatory Compliance Assistance (GLBA,  Penetration Testing Breach Notification, US Safe Harbor, EU  Wireless Security Assessment Directive 95/46/EC, PIPEDA, HIPAA)  Social Engineering  Personally Identifiable Information (PII)  Secure Source Code Analysis (SCA) Discovery  Web Application Security Assessment  Security & Privacy Awareness Training PCI  On-site PCI Data Security Audit Infrastructure Deployment  Remediation Assistance  Secure Architecture Design  Security Scan & Secure Code Audit  Firewall & Intrusion Detection / Prevention System Design & Deployment Benefits  High Availability Web Application  Prevent business disruptions, loss of data, Infrastructure Design & Deployment and disclosure of sensitive information  Systems Hardening resulting from a security breach  Identity Management  Avoid scrutiny from customers, business  Logging Solutions partners, the Board, and regulators 5
  • 6. Information Technology Services IT Consulting Business Continuity  IT Organization Performance Assessment  Disaster Recovery Planning  IT Strategy and Planning  Business Impact Assessment  Technology and IT Process Assessments  Business Continuity Plan Development  Data Center Evaluation  Business Continuity Plan Implementation  ROI/Cost Analysis & Testing  User Surveys  Hurricane Preparedness Planning  Software License Compliance  Data Storage Management  Network Deployment  Outsourcer SLA Development  Project Management  System Selection Project Risk Management Benefits  Project Risk Assessment  Improve performance of the IT  Root Cause Analysis organization, reduce costs, and achieve  Project Oversight & Quality Assurance returns from IT investments  Contract Advisory  Prevent business disruptions from IT  Scope and Change Management failures Assessment  Deliver IT projects on-time, within budget  ERP Controls Optimization Services and achieve anticipated benefits 6
  • 7. PCI Compliance Assistance Services  Sunera provides a full-array of Payment Card Industry (PCI) consulting services designed to help both merchants and service providers achieve a cost effective solution to meet their specific payment card brand and level compliance requirements. Sunera is a PCI Qualified Security Assessor (QSA) and Approved Scanning Vendor (ASV). Our professionals have served all levels of merchants and service providers across a broad spectrum of sectors. – Annual Onsite Audit – Gap Analysis – Penetration Testing – Quarterly External Scanning – Remediation Assistance – Roadmap to Compliance – Self Assessment Questionnaire Completion – Web and Application Code Reviews – Franchise Compliance Programs – PCI Awareness and Training Programs 7
  • 8. Data Privacy and Forensic Assistance  Privacy continues to be a significant business issue. It challenges organizations from a number of perspectives, including business risk, compliance, brand and reputation. Sunera has performed data privacy projects for large, international organizations impacted by almost every major privacy law in the United States, Canada and the European Union. We can help organizations effectively manage business risks and compliance issues relating to data privacy. – Corporate Privacy Framework – Principle-based Privacy Policy and Privacy Charter – Data Classification Model – Privacy Gap Analysis Validating Compliance with Applicable Regulations – Safe Harbor and EU DPA Registrations – Breach Notification Procedures – Web-based and Classroom Privacy Awareness Training  Sunera is extensively familiar with, and maintains a library of privacy legislation requirements for the United States, Canada, Asia, and Europe. This library includes, but not limited to: HIPAA, Gramm-Leach-Bliley Act (GLBA), Children’s Online Privacy Protection Act (COPPA), Personal Information Protection and Electronic Documents Act (PIPEDA), Freedom of Information and Protection of Privacy Act (FOIP Act), UK Data Protection Act, EU Directive 95/46/EC, and US Safe Harbor. 8
  • 9. Our Values Thought We deliver proactive, unbiased, tried and true guidance. Leaders We deploy fulltime, trained and certified professionals with appropriate oversight utilizing proven, pragmatic methodologies to ensure our teams deliver consistent Quality results. Our professionals are accustomed to working together using standardized approaches and delivery methods resulting in a unified engagement team. We tailor each project to your specific needs. Our flexible, client-centric Collaborative approach enables us to deploy teams which complement our clients’ internal capabilities, address resource constraints and facilitate knowledge transfer. We readily adhere to your timetable, unlike “Big-4” firms which are burdened by Responsive onerous internal risk management practices. We are solution orientated. We are known for completing projects that achieve Solution anticipated benefits, on-time and within budget. Our rigorous project Focused management discipline combined with our finance and IT capabilities enables us to successfully deliver a wide-range of services. Balanced We recognize that “best practices” are not always appropriate and provide cost- Perspective effective solutions that find the right balance between risk and control. 9
  • 10. Learn more about Sunera Vancouver Calgary Toronto Atlanta Boston Phoenix Dallas New York Charlotte Silvana Capaldi Tampa Account Executive, Client Services scapaldi@sunera.com Miami www.sunera.com 10