A common Southern U.S. phrase is: "If it ain't broke, don't fix it!" That means you have to know what works and what doesn't. Assessments are the only way to really know. Security vulnerability assessments, penetration tests, and response plan testing can identify coverage gaps and protect you from potentially substantive consequences. Even if an assessment finds no gaps, the process itself provides assurance of security posture and keeps personnel current on your security policy. Organizations that aggressively test their plans react better and faster when interruptions occur.

Solomon Consulting Inc. is here to help you be prepared. We'll work with you to identify gaps that could cause problems and suggest changes to mitigate those gaps in a resource-effective approach.

Our complete assessment services determine how well your organization meets requirements, including:
  • Security policy
  • Regulations
  • Industry standards
  • Legislation
  • Stakeholder requirements
  • Post-event analysis (forensics)

Solomon Consulting Inc. focuses on engaging all personnel in the security and privacy assurance process. We use current techniques to ensure assessments and security awareness training is effective and time well spent.

  • ● Security Policy
    • • Review/audit of existing policy
      • · Plan integrity/coverage analysis (does it satisfy goals?)
      • · Best practices alignment
      • · Requirements gap analysis
    • • Gap remediation recommendations

  • ● Incident Response Plan
    • • Computer Security Incident Response Team (CSIRT) plan review
    • • Incident Response Plan review
      • · Best practices alignment
      • · Requirements gap analysis
      • · Gap remediation recommendations

  • ● Business Continuity Plan (BCP)/Disaster Recovery Plan (DRP)
    • • Review and readiness assessment
      • · Identify readiness gaps (before they cause damage)
      • · Tabletop exercise / cybersecurity simulation
        • ∙ Gamification (engages younger team members)
        • ∙ Interactive/instructive
        • ∙ Exposes weaknesses
        • ∙ Engages actors at all levels