Process

As I speak with prospective clients about potential consultation, there are often questions about the time and personnel involvement. For most businesses without full-time information security staff, this is a relatively new discipline and approach. The following outline is one possible scenario for our working together in minimize the risks that threaten your critical resources. To see how the outline might be modified to fit your situation, please click here to contact me.

 Initial Conference

  • Core Management Team
  • J.L. Peters – Facilitator
  • Critical Resources
  • Physical
  • Intangible
  • Human
  • Risk Recognition
  • Assignments

First Follow Up

  • Core Management Team
  •  J.L. Peters – Facilitator
  • Preparation of Risk Cost Analysis & Review of Controls
  • Current
  • Modifications
  •  Additions Policy/Procedure Review Agenda for Future

 Potential Engagement(s)

  • Reality Check – Unknown Compromises
  • Departmental Practice Review
  • Social Engineering
  • Best Practice Implementation