Truetimes Inc
Policy
P
Your IT Security Policy is the cornerstone of your IT Security Program. Our services include:
Draft, Review or Update your Organization's Policy Framework
Align policy with relevant standards
Ensure digital security objectives are clearly defined
Adapt policies to meet evolving business and IT requirements
Tailor policies to your organizations specific mandates and objectives
Services
Does your IT Security Program PASS?
​
At Truetimes Inc., our customized services revolve around the P.A.S.S. pillars: Policy, Assessment, Strategy and Solutions.
Assessment
A
We'll help you to understand the status of your organization, and evaluate where there is room for improvement through:
Security architecture review
Threat and risk assessment
Identify vulnerabilities
Gap analysis
Compliance with relevant standards
Organizations have many options to address risks - they may choose to terminate vulnerable business lines, apply new resources to address threats, or accept a given level of risk. We'll guide you through this process, including:
Prioritization
Allocating resources
Planning for bridging gaps between the status quo and required standards
​
​
strategy
S
Choosing the best solutions helps to ensure that your IT Security Program meets your objectives. We'll help you to evaluate and choose the best solutions and solution architecture. Some examples of solutions include:
Security and defense controls
Firewalls
Intrusion detection/prevention
Security event and information management
...and many more.
solutions
S
