top of page

Policy

P

Your IT Security Policy is the cornerstone of your IT Security Program.  Our services include:

Draft, Review or Update your Organization's Policy Framework

Align policy with relevant standards

Ensure digital security objectives are clearly defined

Adapt policies to meet evolving business and IT requirements

Tailor policies to your organizations specific mandates and objectives

Services

Does your IT Security Program PASS?

​

At Truetimes Inc., our customized services revolve around the P.A.S.S. pillars: Policy, Assessment, Strategy and Solutions.  

Assessment

A

We'll help you to understand the status of your organization, and evaluate where there is room for improvement through:

Security architecture review

Threat and risk assessment

Identify vulnerabilities

Gap analysis

Compliance with relevant standards

Organizations have many options to address risks - they may choose to terminate vulnerable business lines, apply new resources to address threats, or accept a given level of risk.  We'll guide you through this process, including:

Prioritization

Allocating resources

Planning for bridging gaps between the status quo and required standards

​

​

strategy

S

Choosing the best solutions helps to ensure that your IT Security Program meets your objectives.  We'll help you to evaluate and choose the best solutions and solution architecture.  Some examples of solutions include: 

Security and defense controls

Firewalls

Intrusion detection/prevention

Security event and information management
...and many more.

solutions

S

bottom of page