Brown Smith Wallace risk advisory services helps our clients prevent information security attacks and data exposures that challenge organizations. The goal is to effectively manage and control these risks. All too often, organizations are unaware of the information security risks they face, and are unable to manage risks in the event of an information security and privacy breach.
Businesses may face potential litigation, regulatory fines, and reputation issues if sensitive information is not properly protected. The risks are typically higher in industries with complex regulatory requirements, in organizations that are unable to determine what constitutes sensitive data and in organizations that lack an integrated approach to data privacy.
Our team of highly experienced security & privacy professionals will examine your critical business systems and determine the level of exposure you have to internal and external threats. We provide a wide array of security and privacy services listed below to assist organizations in identifying and addressing potential security exposures, such as loss of customer data, loss of revenue and reputation damage, before they become problems. Our services include:
Vulnerability assessment, attack and penetration testing, web application and client/server application security, wireless security, social engineering, physical security
HIPAA program assessment, ISO 27002 gap analysis, security policies development and review, security program guidance, risk program development and assessment
Data Security and Privacy
Data classification and retention review, data discovery and data loss prevention (DLP)
Security Controls Assessment
Firewall policy assessment, security and IT architecture review, voice over IP infrastructure review, database security review
Staff Augmentation and Training
Chief information security officer (CISO) as you grow, security staffing, security awareness program development and training, security and IT training
With our help, our clients have been able to dramatically reduce their security and privacy risks by conducting gap assessments and implementing remediation plans.
Incident Response and Forensic Services
Digital forensics, eDiscovery and litigation services, incident response, incident response program guidance
Approximately 90 percent of US companies are involved in litigation. A critical component in nearly every internal investigation or litigation matter is computer data. In order to utilize this data, it must be properly preserved, collected, analyzed and reported. The cybercrime and computer forensic services we provide preserves and collects data. Information security is often difficult because of the alarming rate at which data is growing, and the variety of data sources available, including computers, file servers, e-mail systems, backup tapes, mobile tablet and cell phones.
Our cybercrime and computer forensic team helps clients perform more effective internal investigations and prepare for litigation by acquiring, analyzing and presenting digital data that will support or refute their legal positions. Our cybercrime and computer forensic professionals can respond rapidly – both locally and globally – without disrupting routine business operations or compromising data integrity.
Our team includes professionals with deep cybercrime and computer forensic knowledge and experience in computer forensics protocols, network infrastructure and evidence control. In a typical engagement, we begin by working with clients to identify all the relevant data sources and provide tools to preserve the data using standard and accepted processes. We use our expertise in cybercrime, computer forensics and e-discovery to help clients with:
| || |
Computer forensics is the process of preserving, recovering and analyzing existing, deleted, cached and hidden data from IT equipment. Our professional computer forensics team has the ability to analyze a wide range of devices from laptops to servers. Our computer forensic services include:
- Forensic incident response
- Forensic litigation support
- Incident response process improvement
For more information on computer forensics, or our other information security services please contact Anthony Munns, FBCS, CITP, CIRM, CISA at 314.983.1297 or email@example.com to schedule your IT risk assessment.