ERE Information Security Auditors
Home | Site Map | Contact Us | |  Resource Center
This text is replaced by the Flash movie.
list of IT security and compliance audit steps
ERE Differentiators from other vendors

Cyber Security Auditing for Managing Risk

ERE are IT security auditors who specialize in cyber security auditing. We write compliance reports for every major IT security and regulatory compliance standard today. As CISSP qualified information security auditors our suite of network security services are customized to each client's specific needs and our scope covers 75+ different IT security subject areas. As security auditors we identify and triage by threat level, actual pending risk, and even attacks in progress with our 7x24 service for monitoring network security and compliance . We follow-up with a range for network security services including implementation and consulting, all provided by our CISSP certified security systems consultants.

The value of ERE's network security auditor services begin where typical cyber security auditors leave off. Our exclusive focus on finding security risks, their impact on business results and how to fix them.

Current Front Burner Concerns

  • Cloud security vulnerabilities
  • Managing cloud security
  • Cloude security checklist
  • Data leaks and data leak prevention or DLP
 

IT Audit Checklist

Our audit checklist includes people, IT technology and processes; the core triad of information security auditing.

  Process  


People
 

Technology

Contact Us Right Up Front

Let us assist you to budget for your next audit. May we send you an audit report template or an IT audit checklist? Contact us and we'll help you scope the right sized audit for your organization

 
Top
 
 
 
 
 
 

Contact Us

905 764 3246

 
 
  Budgetary Price Quote
  10 minute scope definition call
  ROI Calculation for your next Audit 
  Sanitized Statement of Work
  Sanitized Audit Report
  Product Literature  
  White Papers and Published Articles
   
  Please see Ron Lepofsky’s book,
The Manager’s Guide to Web Application Security,
published by Apress Media

http://www.apress.com/9781484201497

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively.

 
Home | Technology Audits | Compliance Audits | Process Audits | Doc Audit/Authorship| | 7x24 Monitoring | Knowledge Transfer
ERE Differentiators | About Us | Site map | Contact Us | |   | Resource Center
Copyrights © 2007-2008. All rights reserved.  

   AddThis Social Bookmark Button