The Challenge
With a business model centered around data analysis and AI-driven insights, this SaaS asset management business provides financial and consumer information to business professionals. Third-party entities provide much of the data consumed by the organization and require strict security controls to meet contractual obligations.
This global organization relies on a strictly remote workforce to develop, maintain, and use its highly proprietary code, creating a security and compliance blind spot. No corporate network environment is maintained, so the firm had no in-house security staff and relied on its CTO to handle security-related issues.
Our Solution
The client engaged Converge Cybersecurity’s Virtual CISO (vCISO) experts to develop a compliance program, including policies, evidence, and artifacts. We led interviews, learned their environment, and assessed their maturity.
Remediations were identified and moved to parallel workstreams to strengthen their security and advance security initiatives. The vCISO developed a protocol and established an internal liaison to work in coordination with those efforts.
The vCISO helped the organization qualify and select a security technology to support audit and evidence needs and provide endpoint detection and response. Our team guided the implementation and optimized deployment of this technology for the client’s environment.
The Result
An actionable roadmap helped the client address compliance obligations and create evidence-producing audit processes. This was successfully fast-tracked to help the client land a valuable, strategic customer. In just under three months, the organization passed a control inspection and showed adherence to over 120 compliance and security controls.
The vCISO tapped Converge’s deep resources to assist with policymaking, DevOps support, and AI. The client achieved SOC 2, Type II certification and continues to deliver bleeding edge predictive analytics and AI solutions in a secure and compliant manner.
We listen first, learning your goals and objectives. Then we apply decades of frontline experience, cutting-edge technical knowledge, and top-tier vendor relationships to help you mitigate risk, optimize outcomes, and harden your security posture through shifting threats, regulations and technologies. Contact us today to learn more.