top of page
Home: Welcome

TELASA | SECURITY

Strategic Security Advisory

 

Telasa offers Strategic Security Advisory services to help organizations understand the current posture of their security program, and to develop strategics to achieve desired future state.

​

Security Program Assessments – Telasa Security Program Assessments include the following components:

 

  • A risk assessment to identify business and technological risks to the organization.

 

  • Review of Information security policies and procedures

 

  • Review of network security architecture and technology in place in the environment

 

  • Review of security hardening and patching processes

 

  • Review of the organization’s threat detection and response program

 

  • User training and security awareness and social engineering review

 

  • A review of third-party security risk

 

  • A report that includes an analysis of information gathered, an evaluation of Security Program alignment with organizational risks, and documentation of recommendations to better align Security Program with organizational risks.

 

External Risk Profile – Organizational risk profiles document potential organizational risks based on a review of the organization’s Internet footprint, company info available via Online / Social Media, information stored in online repositories like GitHub, search engines used by attackers, and other passive information gathering techniques.

 

Security Strategy and Roadmap Development – Telasa security strategy and roadmap development projects help clients document a desired future state for cybersecurity in their organizations, and to identify the sequence of steps necessary to achieve that future state.

Telasa Security

Telasa Strategic Security Advisory, Technical Consulting, and Cloud Security services help clients develop and validate effectiveness of cyber security programs.

Understand organizational risk and develop long-term security strategies

Evaluate technical security controls and test organizational defenses against simulated attacks

Ensure secure implementation of cloud services

Home: Services

Contact Us

(773) 718-1189

Home: Contact
bottom of page