Information Technology Audit

  Home

  Why us

  Services

  Promises

  Contact us

 

  Chinatown Online Co.  - Services

The Chinatown Online Co's. services include:

1. Information Technology Audit.  Performing external and internal network and system security tests, discovering potential vulnerabilities, providing fixes and  closing open issues.  Ensuring the client's networks and systems are both running in a secured state.

       Other Professional Security Services

Below is a detailed breakdown of the various security assessment offerings that Chinatown Online Co. provides.  The client may, at any time, add any optional security services as stated below, that would amount to a work effort for which a SOW could be developed and agreed to by Chinatown Online Co. and the client, based on our weekly rates for professional support.

 

Compliance Assessments – Comprehensive assessments of your Information Protection or Privacy programs against Legal, Regulatory, and Industry protective requirements, identify gaps through a score approach, and provide implementation strategies to more programs to the next level.

•       Assess ISO 17799/27001 Compliance and  SOX Compliance

•       Assess GLBA and /or HIPAA Compliance

•       Assess PCI Compliance

 

Program Assessments - Comprehensive assessments of your Information Protection or Privacy programs against Chinatown Online Co.’s reference model for your Industry, identify gaps through a score approach, and provide implementation strategies to more programs to the next level.

•     Assess Risk/Threat Management Program

•     Assess Policy, Standards, and Baselines Program

•     Assess Training and Awareness Program

•     Assess Identity and Assess Mgt. Program

•     Assess Security Compliance Program

•     Assess Incident Response and Investigations Program

•     Assess Security Engineering Program

•     Assess Secure Product Development Program

 

Program Implementation – Implementation services help our clients realize the value of our assessment in terms of improving their program, closing protective gaps, and enhancing program effectiveness.

•     Assess Risk/Threat Management Program

•     Assess Policy, Standards, and Baselines Program

•     Assess Training and Awareness Program

•     Assess Identity and Assess Mgt. Program

•     Assess Security Compliance Program

•     Assess Incident Response and Investigations Program

•     Assess Security Engineering Program

•     Assess Secure Product Development Program

 

Professional Staff Support – Provision of business, operational, and technical professionals to meet your program implementation needs.

•    CSO/CPO/CISO Executive Support

•    Security Manager Support

•    Security Subject Matter Expert Support

2. Setting Up Secured Networks and Systems. If you do not have a network or a system and want to have one, we can help you with that. These networks or systems can be any kind: WAN, LAN, VPN, WLAN, etc. We not only set up a network or a system for you, we set it up in a secured way.

3. Security Policy Design and Implementation. If your company does not have an information security policy or guide and want to have one, we can help. We will design one to meet your best information security practices.

 

 

 

 













Copyright© 2007 Chinatown-online.com all rights reserved.