Our security thought leaders will provide written and oral recommendations based on the Center for Internet Security (CIS 20) assessment results. A presentation designed to support security recommendations will be delivered after the assessment.
Our breach prevention technology deployment is a part of the project activities. We inventory data privacy assets and define access lists.
We use data discovery and API engines to focus on general inventory. Doing so serves as the basis for future integrations with our API engine technology.