SlideShare une entreprise Scribd logo
1  sur  12
1 
Mission Critical Global 
Technology Group 
(MCGlobalTech) 
Information Security and 
IT Infrastructure 
Management Consulting
2 
Rationale for MCGlobalTech Security Services 
The protection of IT infrastructure is critical to the manufacturing, industrial, healthcare, science and 
defense industries. All organizations must protect their systems from attacks that can negatively affect 
operations, services and put proprietary information at risk. An organization’s information security 
posture can be increased through our Enterprise Security Maturity Program. We help you better 
understand and comply with industry standards and federal regulations. 
• Open technologies and networked systems used by industry are a likely target for malicious 
cyber activities because they are easily accessible, have a wide installation base and detailed 
information is available on the Internet. 
• Internet-based attacks can wreak havoc on your organization. You are connected with 
customers, vendors, suppliers and governments, and are entrusted with vast amounts of 
sensitive data such as intellectual capital, proprietary information, etc. 
• Your organization can be a leader in responding to new cybersecurity threats. Strong 
governance and a mature information security program that draws on industry-driven best 
practices can significantly improved cybersecurity posture.
3 
The Security Challenge 
Information Security challenges all organizations face: 
• Organizations in practically every industry are under immense pressure to improve quality, reduce complexity, 
increase efficiency and better manage IT expenses; 
• Information Systems and data exchanges are vital components to meet these growing challenge, however, the 
adoption of technology introduces an abundance of security risks; 
• Growing risks and liabilities, including unauthorized access, data breaches, regulatory violations, new 
technology implementation, etc.; 
• Strong IS governance, oversight, and a thorough understanding of regulatory requirements, industry standards, 
and best practices is required to reduce and mitigate the risk of successful cyber crimes; 
General obstacle to overcome these challenges include but not limited to: 
• Redundant and inconsistent requirements and standards; 
• Confusion surrounding implementation and acceptable minimum controls; 
• Inefficiencies associated with varying interpretations of control objectives and safeguards; 
• Increasing scrutiny from regulators, auditors, underwriters, customers and business partners; 
• Lack of highly trained cyber security staff to address information security needs.
4 
Overcoming The Challenges 
The recognized importance of information security and compliance has seen significant growth in recent 
years. With the integration of networked business systems, comes the risk of malicious software and the 
malicious acts of cyber criminals. With constantly changing technology and the Internet, the security 
risks are greatly increasing. All industries have challenges mitigating security issues. 
To effectively manage information security, a strong Information Security strategy must be put in 
place. The strategy should focus on three elements – People, Process and Technology. 
• People are the cornerstone to every security program. Having proper leadership, competent 
security staff and trained users ensures security is adequate considered in all business 
operations. 
• Process ensures the appropriate security practices and procedures are developed, 
implemented and maintained to support in support of a well-defined security governance 
framework. 
• Technology ensures that the appropriate security controls are in place to protect your 
environment from all assessed threats, vulnerabilities, and resulting risks.
5 
Corporate Overview 
Mission Critical Global Technology Group is a minority owned, small business founded by industry leaders who 
take an agile, innovative and practical approach to problem solving in the ever changing world of information 
technology and security. Our experts combine many decades of experience in industries such as Finance, Health 
Care, Manufacturing, Insurance, Education, Federal, State and Local Government agencies. Our expertise, 
professionalism and client-focused approach are distinguishing characteristics of our company. 
Vision 
Our vision is to build a Global Information Security and Technology Infrastructure Management Firm based on 
quality people, quality processes and passion for benefiting our clients. 
Mission 
We dedicate ourselves to the mission of providing the highest quality, meticulously planned, customized and 
innovative information technology and information security solutions to assist client organizations increase 
productivity, protect investments and comply with applicable security regulations through research, innovation, 
and expert consulting services.
6 
Consulting Services 
Governance Risk Compliance or Management 
MCGlobalTech assesses the gaps between your existing security posture, regulatory requirements, industry 
standards and best practices. We provide expert services in implementing necessary cost-effective controls and 
procedures unique to your business environment. We will assist you with achieving and maintaining compliance 
through assessments, remediation, continuous monitoring, and staff training. 
Our expertise include but are not limited to the following federal regulations and Industry Standards. 
• HIPAA COBIT 
• GLBA SAS70 
• FISMA NIST 
• PCI ISO 27001,2 
• ISA99 
Enterprise Information Security Solutions and Services (Security Management Program) 
MCGlobalTech Enterprise Security Assessment methodology comprises of a full information security program 
review. This includes all procedural, technical and non-technical security initiatives of the organization as a whole. 
Our methodology allows for a comprehensive Network, Systems and Applications security audit. The goal is 
investigate and identify all internal and external threats and vulnerabilities. We help our clients develop, 
implement, and maintain reality-based effective and cost-friendly risk management strategies.
7 
Consulting Services 
Cloud Computing Security Services 
MCGlobalTech helps you navigate the ever expanding maze of cloud computing security options required for your 
remote applications, systems and infrastructure hosting needs. With the current lack of industry security 
standardization, each cloud provider provides a differing level of security controls. We help you audit your existing 
in house and remote infrastructure; and design minimum system security requirements to protect your sensitive 
data that is hosted outside your organization’s security boundaries. Cloud Computing Security Services Include 
the following services: 
• Cloud Vendor Security Assessment 
• Cloud Migration Assistance 
• Cloud Infrastructure Security Assessment & Mitigation Service 
Information Technology Infrastructure Management Consulting 
MCGlobalTech provides executive level IT management consulting to help you manage and address your IT 
infrastructure needs. We will help you align your information technology infrastructure organization with your 
operational and strategic business goals. Our Information Technology Management Consulting Services include: 
• Business/ IT Alignment Consulting IT Governance Consulting 
• Virtual/Interim CIO Services Program Management
8 
MCGlobalTech Full Lifecycle Service Delivery 
Management 
Four Customizable Phases 
Stakeholders 
IS/IT Team 
Enterprise 
Information 
Technology/Security 
Program 
Management 
Day-to-Day 
Operations and 
Management 
P1: Assessment 
Work with 
stakeholders 
Develop Gap 
Assess Current 
IT / IS Posture 
P2: Planning Analysis 
P3: Implementation 
P4: Continuous 
Monitoring 
Recommendation / 
Gap Remediation 
Plan of Action 
People / Process 
/ Technology 
Integration 
Monitor Performance 
/ Controls / Metrics
9 
MCGlobalTech Full Lifecycle Service Delivery 
Assessment 
Planning Implementation 
Key Activities 
Deliverables 
Gap remediation 
project plan 
Assessment gap 
analysis and 
recommendations 
based on regulations, 
standards, and best 
practices for industry 
Executive reporting of 
gap remediation 
progress 
Review governance 
model, policies, 
procedures, 
standards and 
practices 
Baseline 
assessment of 
current security 
posture 
Baseline 
assessment of IT 
infrastructure 
Develop gap remediation 
Implementation project 
plan in accordance with 
organization stakeholders 
Program 
management of gap 
remediation plan 
Remediation tracking 
Develop Information 
Security Program 
Improve IT 
infrastructure 
management 
Our standard approach includes: 
 A security framework; 
 A maturity model assessment; 
 A gap analysis based on industry standards 
and best practices; 
 A service deliverance model that includes 
governance, policies, InfoSec Program; 
 Recommendations; 
 Remediation assistance. 
Example Engagement Project Plan 
Project 
Key 
Activates 
W 
e 
e 
k 
1 
W 
e 
e 
k 
2 
W 
e 
e 
k 
3 
W 
e 
e 
k 
4 
W 
e 
e 
k 
5 
W 
e 
e 
k 
6 
W 
e 
e 
k 
7 
W 
e 
e 
k 
8 
W 
e 
e 
k 
9 
Initiation 
Scope 
Fact Finding 
Assessment 
Planning 
Gap Analysis 
Remediation / 
Strategy 
InfoSec Prog. 
Implementation 
PM Assist 
Reporting 
The timeline will vary according 
to the type, scope and complexity 
of client business, IT infrastructure 
management and security requirements 
Continuous 
Monitoring 
Monitor security 
program & 
operations 
Monitor IT 
infrastructure 
management 
Recommend 
continual program & 
operations 
improvements 
Periodic assessment & 
continuous advisory 
support 
Process Improvement
10 
MCGlobalTech Positioning Statement 
• Managing security risks, compliancy to federal regulations and industry standards, classifying 
information, IT governance and policy development, requires organizations to better understand 
and control governance, processes, and security measure, while supporting existing business 
operations. 
• Organizations are starting to take steps to implement integrated solutions to address this need 
and this trend is likely to continue or accelerate in the years to come. Therefore, an independent 
Information Security Program Assessment should be performed to determine the organization's 
security posture, security gaps, and necessary corrective actions. 
Services offered to help you better manage your Security and IT Infrastructure: 
• Security Governance, Risk & Compliance Assessment Services 
• Enterprise Information Security Management Services 
• Cloud Computing Security Management Services 
• IT Infrastructure Management Services
11 
MCGlobalTech Summary Cont. 
Core Competencies 
Governance & 
Compliance 
Enterprise Information 
Security (EIS) 
Cloud Computing 
Security Services 
IT Infrastructure 
Management Services 
IS Governance & Policy 
Review 
CIO / Director Level 
Advisory 
Develop / Review Cloud 
Security Governance & 
Policies 
IT Infrastructure 
Management Assessment 
Security Strategy & 
Process Development 
Enterprise Information 
Security Program 
Implementation 
Develop Cloud Computing 
Security Program 
IT Infrastructure Gap 
Analysis 
Federal Regulation 
Compliance Assessment 
(i.e., FISMA, NIST, GLBA, 
HIPAA) 
Enterprise Information 
Policy Review 
Perform Deep Dive Cloud 
Security Assessment 
IT Infrastructure 
Management Planning 
Industry Standards 
Compliance Assessment 
(i.e., PCI DSS, ISO 
27001,2, ISA99, etc.) 
Security Measure & 
Controls Assessment 
Against Industry Standards 
Security GAP Analysis IT Infrastructure 
Management Remediation 
Security Measure & 
Controls Assessment 
Against Industry Federal 
Regulations 
Manage / Implement GAP 
Remediation / Continuous 
Monitoring 
IT Infrastructure 
Management Monitoring 
/Improvement
12 
Contact Us 
Mission Critical Global Technology Group 
1776 I Street, NW 
9th Floor 
Washington, District of Columbia 20006 
Phone: 571-249-3932 
Email: Info@mcglobaltech.com 
William McBorrough Morris Cody 
Managing Principal Managing Principal 
wjm4@mcglobaltech.com mcody@mcglobaltech.com

Contenu connexe

Tendances

Security Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurity Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurestorm
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Developing an Information Security Roadmap
Developing an Information Security RoadmapDeveloping an Information Security Roadmap
Developing an Information Security RoadmapAustin Songer
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09Tammy Clark
 
Cybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best PracticesCybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best PracticesTony Moroney
 
Cyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its AnalysisCyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its AnalysisRahul Neel Mani
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? PECB
 
Trends in Information Security
Trends in Information SecurityTrends in Information Security
Trends in Information SecurityCompTIA
 
How to Use the NIST CSF to Recover from a Healthcare Breach
 How to Use the NIST CSF to Recover from a Healthcare Breach  How to Use the NIST CSF to Recover from a Healthcare Breach
How to Use the NIST CSF to Recover from a Healthcare Breach Symantec
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobPriyanka Aash
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Cohesive Networks
 
Manning Information Security Strategy
Manning Information Security StrategyManning Information Security Strategy
Manning Information Security StrategyDonald Tabone
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standartnewbie2019
 
Information Security Project
Information Security ProjectInformation Security Project
Information Security Projectnovemberchild
 
Iso 27001 2005- by netpeckers consulting
Iso 27001 2005- by netpeckers consultingIso 27001 2005- by netpeckers consulting
Iso 27001 2005- by netpeckers consultingIskcon Ahmedabad
 

Tendances (20)

Security Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurity Framework for Digital Risk Managment
Security Framework for Digital Risk Managment
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Developing an Information Security Roadmap
Developing an Information Security RoadmapDeveloping an Information Security Roadmap
Developing an Information Security Roadmap
 
TOGAF 9 - Security Architecture Ver1 0
TOGAF 9 -  Security Architecture Ver1 0TOGAF 9 -  Security Architecture Ver1 0
TOGAF 9 - Security Architecture Ver1 0
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09
 
Cybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best PracticesCybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best Practices
 
Cyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its AnalysisCyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its Analysis
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
 
Trends in Information Security
Trends in Information SecurityTrends in Information Security
Trends in Information Security
 
How to Use the NIST CSF to Recover from a Healthcare Breach
 How to Use the NIST CSF to Recover from a Healthcare Breach  How to Use the NIST CSF to Recover from a Healthcare Breach
How to Use the NIST CSF to Recover from a Healthcare Breach
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your Job
 
S Rod Simpson Resume
S Rod Simpson ResumeS Rod Simpson Resume
S Rod Simpson Resume
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
 
Manning Information Security Strategy
Manning Information Security StrategyManning Information Security Strategy
Manning Information Security Strategy
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
GSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through AcquisitionGSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through Acquisition
 
IT Security & Governance Template
IT Security & Governance TemplateIT Security & Governance Template
IT Security & Governance Template
 
Information Security Project
Information Security ProjectInformation Security Project
Information Security Project
 
Iso 27001 2005- by netpeckers consulting
Iso 27001 2005- by netpeckers consultingIso 27001 2005- by netpeckers consulting
Iso 27001 2005- by netpeckers consulting
 

Similaire à MCGlobalTech Service Presentation

MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementWilliam McBorrough
 
Strategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdfStrategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdflilabroughton259
 
Expert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxExpert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxkathyzink87
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Manuel Guillen
 
Mastering IT - A Guide to Managed Services Excellence.pdf
Mastering IT - A Guide to Managed Services Excellence.pdfMastering IT - A Guide to Managed Services Excellence.pdf
Mastering IT - A Guide to Managed Services Excellence.pdfLogicEra
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting OverviewRonan Martin
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!Heather Salmons Newswanger
 
4 Key Benefits of Managed IT Security Services – Devlabs Global
4 Key Benefits of Managed IT Security Services – Devlabs Global4 Key Benefits of Managed IT Security Services – Devlabs Global
4 Key Benefits of Managed IT Security Services – Devlabs GlobalDevLabs Global
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan MMohan M
 
Step-by-Step-Plan-to-Start-with-Managed-IT-Services.pdf
Step-by-Step-Plan-to-Start-with-Managed-IT-Services.pdfStep-by-Step-Plan-to-Start-with-Managed-IT-Services.pdf
Step-by-Step-Plan-to-Start-with-Managed-IT-Services.pdfjaimachintel
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement William McBorrough
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Software
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseGeorge Goodall
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Servicessarah kabirat
 

Similaire à MCGlobalTech Service Presentation (20)

MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
 
Strategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdfStrategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdf
 
Expert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptxExpert Compliance Solutions by Ispectra Technologies.pptx
Expert Compliance Solutions by Ispectra Technologies.pptx
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020
 
Mastering IT - A Guide to Managed Services Excellence.pdf
Mastering IT - A Guide to Managed Services Excellence.pdfMastering IT - A Guide to Managed Services Excellence.pdf
Mastering IT - A Guide to Managed Services Excellence.pdf
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting Overview
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
 
4 Key Benefits of Managed IT Security Services – Devlabs Global
4 Key Benefits of Managed IT Security Services – Devlabs Global4 Key Benefits of Managed IT Security Services – Devlabs Global
4 Key Benefits of Managed IT Security Services – Devlabs Global
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
 
Step-by-Step-Plan-to-Start-with-Managed-IT-Services.pdf
Step-by-Step-Plan-to-Start-with-Managed-IT-Services.pdfStep-by-Step-Plan-to-Start-with-Managed-IT-Services.pdf
Step-by-Step-Plan-to-Start-with-Managed-IT-Services.pdf
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, Entreda
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
 
Decode_Portfolio2016
Decode_Portfolio2016Decode_Portfolio2016
Decode_Portfolio2016
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Services
 

Plus de William McBorrough

MCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance ServiceMCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance ServiceWilliam McBorrough
 
MCGlobalTech Managed Security Compliance Program
MCGlobalTech Managed Security Compliance ProgramMCGlobalTech Managed Security Compliance Program
MCGlobalTech Managed Security Compliance ProgramWilliam McBorrough
 
Cybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberCybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberWilliam McBorrough
 
Improving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity FrameworkImproving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity FrameworkWilliam McBorrough
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementWilliam McBorrough
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementWilliam McBorrough
 
MCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management ProgramMCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management ProgramWilliam McBorrough
 
MCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalMCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalWilliam McBorrough
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkWilliam McBorrough
 
MCGlobalTech Capability Statement
MCGlobalTech Capability StatementMCGlobalTech Capability Statement
MCGlobalTech Capability StatementWilliam McBorrough
 
Managing Security Risks in Manufacturing
Managing Security Risks in ManufacturingManaging Security Risks in Manufacturing
Managing Security Risks in ManufacturingWilliam McBorrough
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryWilliam McBorrough
 
Protecting Customer Confidential Information
Protecting Customer Confidential InformationProtecting Customer Confidential Information
Protecting Customer Confidential InformationWilliam McBorrough
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseWilliam McBorrough
 
FCC Report on Google Street View Wi-Fi Data Snooping
FCC Report on Google Street View Wi-Fi Data SnoopingFCC Report on Google Street View Wi-Fi Data Snooping
FCC Report on Google Street View Wi-Fi Data SnoopingWilliam McBorrough
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
 

Plus de William McBorrough (19)

MCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance ServiceMCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance Service
 
MCGlobalTech Managed Security Compliance Program
MCGlobalTech Managed Security Compliance ProgramMCGlobalTech Managed Security Compliance Program
MCGlobalTech Managed Security Compliance Program
 
Cybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberCybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen Cyber
 
Improving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity FrameworkImproving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity Framework
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
MCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management ProgramMCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management Program
 
MCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalMCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_Final
 
MCG_OnePageBrochure_Final
MCG_OnePageBrochure_FinalMCG_OnePageBrochure_Final
MCG_OnePageBrochure_Final
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management Framework
 
MCGlobalTech Capability Statement
MCGlobalTech Capability StatementMCGlobalTech Capability Statement
MCGlobalTech Capability Statement
 
Managing Security Risks in Manufacturing
Managing Security Risks in ManufacturingManaging Security Risks in Manufacturing
Managing Security Risks in Manufacturing
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
Protecting Customer Confidential Information
Protecting Customer Confidential InformationProtecting Customer Confidential Information
Protecting Customer Confidential Information
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law Please
 
FCC Report on Google Street View Wi-Fi Data Snooping
FCC Report on Google Street View Wi-Fi Data SnoopingFCC Report on Google Street View Wi-Fi Data Snooping
FCC Report on Google Street View Wi-Fi Data Snooping
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 

Dernier

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

MCGlobalTech Service Presentation

  • 1. 1 Mission Critical Global Technology Group (MCGlobalTech) Information Security and IT Infrastructure Management Consulting
  • 2. 2 Rationale for MCGlobalTech Security Services The protection of IT infrastructure is critical to the manufacturing, industrial, healthcare, science and defense industries. All organizations must protect their systems from attacks that can negatively affect operations, services and put proprietary information at risk. An organization’s information security posture can be increased through our Enterprise Security Maturity Program. We help you better understand and comply with industry standards and federal regulations. • Open technologies and networked systems used by industry are a likely target for malicious cyber activities because they are easily accessible, have a wide installation base and detailed information is available on the Internet. • Internet-based attacks can wreak havoc on your organization. You are connected with customers, vendors, suppliers and governments, and are entrusted with vast amounts of sensitive data such as intellectual capital, proprietary information, etc. • Your organization can be a leader in responding to new cybersecurity threats. Strong governance and a mature information security program that draws on industry-driven best practices can significantly improved cybersecurity posture.
  • 3. 3 The Security Challenge Information Security challenges all organizations face: • Organizations in practically every industry are under immense pressure to improve quality, reduce complexity, increase efficiency and better manage IT expenses; • Information Systems and data exchanges are vital components to meet these growing challenge, however, the adoption of technology introduces an abundance of security risks; • Growing risks and liabilities, including unauthorized access, data breaches, regulatory violations, new technology implementation, etc.; • Strong IS governance, oversight, and a thorough understanding of regulatory requirements, industry standards, and best practices is required to reduce and mitigate the risk of successful cyber crimes; General obstacle to overcome these challenges include but not limited to: • Redundant and inconsistent requirements and standards; • Confusion surrounding implementation and acceptable minimum controls; • Inefficiencies associated with varying interpretations of control objectives and safeguards; • Increasing scrutiny from regulators, auditors, underwriters, customers and business partners; • Lack of highly trained cyber security staff to address information security needs.
  • 4. 4 Overcoming The Challenges The recognized importance of information security and compliance has seen significant growth in recent years. With the integration of networked business systems, comes the risk of malicious software and the malicious acts of cyber criminals. With constantly changing technology and the Internet, the security risks are greatly increasing. All industries have challenges mitigating security issues. To effectively manage information security, a strong Information Security strategy must be put in place. The strategy should focus on three elements – People, Process and Technology. • People are the cornerstone to every security program. Having proper leadership, competent security staff and trained users ensures security is adequate considered in all business operations. • Process ensures the appropriate security practices and procedures are developed, implemented and maintained to support in support of a well-defined security governance framework. • Technology ensures that the appropriate security controls are in place to protect your environment from all assessed threats, vulnerabilities, and resulting risks.
  • 5. 5 Corporate Overview Mission Critical Global Technology Group is a minority owned, small business founded by industry leaders who take an agile, innovative and practical approach to problem solving in the ever changing world of information technology and security. Our experts combine many decades of experience in industries such as Finance, Health Care, Manufacturing, Insurance, Education, Federal, State and Local Government agencies. Our expertise, professionalism and client-focused approach are distinguishing characteristics of our company. Vision Our vision is to build a Global Information Security and Technology Infrastructure Management Firm based on quality people, quality processes and passion for benefiting our clients. Mission We dedicate ourselves to the mission of providing the highest quality, meticulously planned, customized and innovative information technology and information security solutions to assist client organizations increase productivity, protect investments and comply with applicable security regulations through research, innovation, and expert consulting services.
  • 6. 6 Consulting Services Governance Risk Compliance or Management MCGlobalTech assesses the gaps between your existing security posture, regulatory requirements, industry standards and best practices. We provide expert services in implementing necessary cost-effective controls and procedures unique to your business environment. We will assist you with achieving and maintaining compliance through assessments, remediation, continuous monitoring, and staff training. Our expertise include but are not limited to the following federal regulations and Industry Standards. • HIPAA COBIT • GLBA SAS70 • FISMA NIST • PCI ISO 27001,2 • ISA99 Enterprise Information Security Solutions and Services (Security Management Program) MCGlobalTech Enterprise Security Assessment methodology comprises of a full information security program review. This includes all procedural, technical and non-technical security initiatives of the organization as a whole. Our methodology allows for a comprehensive Network, Systems and Applications security audit. The goal is investigate and identify all internal and external threats and vulnerabilities. We help our clients develop, implement, and maintain reality-based effective and cost-friendly risk management strategies.
  • 7. 7 Consulting Services Cloud Computing Security Services MCGlobalTech helps you navigate the ever expanding maze of cloud computing security options required for your remote applications, systems and infrastructure hosting needs. With the current lack of industry security standardization, each cloud provider provides a differing level of security controls. We help you audit your existing in house and remote infrastructure; and design minimum system security requirements to protect your sensitive data that is hosted outside your organization’s security boundaries. Cloud Computing Security Services Include the following services: • Cloud Vendor Security Assessment • Cloud Migration Assistance • Cloud Infrastructure Security Assessment & Mitigation Service Information Technology Infrastructure Management Consulting MCGlobalTech provides executive level IT management consulting to help you manage and address your IT infrastructure needs. We will help you align your information technology infrastructure organization with your operational and strategic business goals. Our Information Technology Management Consulting Services include: • Business/ IT Alignment Consulting IT Governance Consulting • Virtual/Interim CIO Services Program Management
  • 8. 8 MCGlobalTech Full Lifecycle Service Delivery Management Four Customizable Phases Stakeholders IS/IT Team Enterprise Information Technology/Security Program Management Day-to-Day Operations and Management P1: Assessment Work with stakeholders Develop Gap Assess Current IT / IS Posture P2: Planning Analysis P3: Implementation P4: Continuous Monitoring Recommendation / Gap Remediation Plan of Action People / Process / Technology Integration Monitor Performance / Controls / Metrics
  • 9. 9 MCGlobalTech Full Lifecycle Service Delivery Assessment Planning Implementation Key Activities Deliverables Gap remediation project plan Assessment gap analysis and recommendations based on regulations, standards, and best practices for industry Executive reporting of gap remediation progress Review governance model, policies, procedures, standards and practices Baseline assessment of current security posture Baseline assessment of IT infrastructure Develop gap remediation Implementation project plan in accordance with organization stakeholders Program management of gap remediation plan Remediation tracking Develop Information Security Program Improve IT infrastructure management Our standard approach includes:  A security framework;  A maturity model assessment;  A gap analysis based on industry standards and best practices;  A service deliverance model that includes governance, policies, InfoSec Program;  Recommendations;  Remediation assistance. Example Engagement Project Plan Project Key Activates W e e k 1 W e e k 2 W e e k 3 W e e k 4 W e e k 5 W e e k 6 W e e k 7 W e e k 8 W e e k 9 Initiation Scope Fact Finding Assessment Planning Gap Analysis Remediation / Strategy InfoSec Prog. Implementation PM Assist Reporting The timeline will vary according to the type, scope and complexity of client business, IT infrastructure management and security requirements Continuous Monitoring Monitor security program & operations Monitor IT infrastructure management Recommend continual program & operations improvements Periodic assessment & continuous advisory support Process Improvement
  • 10. 10 MCGlobalTech Positioning Statement • Managing security risks, compliancy to federal regulations and industry standards, classifying information, IT governance and policy development, requires organizations to better understand and control governance, processes, and security measure, while supporting existing business operations. • Organizations are starting to take steps to implement integrated solutions to address this need and this trend is likely to continue or accelerate in the years to come. Therefore, an independent Information Security Program Assessment should be performed to determine the organization's security posture, security gaps, and necessary corrective actions. Services offered to help you better manage your Security and IT Infrastructure: • Security Governance, Risk & Compliance Assessment Services • Enterprise Information Security Management Services • Cloud Computing Security Management Services • IT Infrastructure Management Services
  • 11. 11 MCGlobalTech Summary Cont. Core Competencies Governance & Compliance Enterprise Information Security (EIS) Cloud Computing Security Services IT Infrastructure Management Services IS Governance & Policy Review CIO / Director Level Advisory Develop / Review Cloud Security Governance & Policies IT Infrastructure Management Assessment Security Strategy & Process Development Enterprise Information Security Program Implementation Develop Cloud Computing Security Program IT Infrastructure Gap Analysis Federal Regulation Compliance Assessment (i.e., FISMA, NIST, GLBA, HIPAA) Enterprise Information Policy Review Perform Deep Dive Cloud Security Assessment IT Infrastructure Management Planning Industry Standards Compliance Assessment (i.e., PCI DSS, ISO 27001,2, ISA99, etc.) Security Measure & Controls Assessment Against Industry Standards Security GAP Analysis IT Infrastructure Management Remediation Security Measure & Controls Assessment Against Industry Federal Regulations Manage / Implement GAP Remediation / Continuous Monitoring IT Infrastructure Management Monitoring /Improvement
  • 12. 12 Contact Us Mission Critical Global Technology Group 1776 I Street, NW 9th Floor Washington, District of Columbia 20006 Phone: 571-249-3932 Email: Info@mcglobaltech.com William McBorrough Morris Cody Managing Principal Managing Principal wjm4@mcglobaltech.com mcody@mcglobaltech.com