ERE Information Security Auditors
Home | Site Map | Contact Us |  Resource Center
list of IT security and compliance audit steps
ERE Differentiators from other vendors

IT Security Compliance Audit for Security Standards


The ERE IT Security Compliance Audit for Security Standards identifies compliance violations and correlates security and privacy vulnerabilities with requirements of each standard.

  • Bill 198 - Canadian Sarbanes Oxley
  • GLB
  • CobiT
  • ISF
  • ITIL
  • PCI DSS readiness
  • Sarbanes Oxley, SOX
  • Canadian SOX or C-Sox
  • GDSN compliance for GS1 data pools

See more

Compliance Audit Checklist

Expertise as Internet Security Compliance Auditors
  • CISSP, CISM designated auditors.
  • Extensive experience identifying IT and Internet security vulnerabilities and correlating them with compliance control points within standards.
Contact us right up front
Compliance auditing need not be onerous or time consuming. Let us assist you select the control points you really need to audit to get the job done. Contact us now and we'll help you cost effectively.



Contact Us

905 764 3246

  Budgetary Price Quote
  10 minute scope definition call
  ROI Calculation for your next Audit 
  Sanitized Statement of Work
  Sanitized Audit Report
  Product Literature  
  White Papers and Published Articles
  Please see Ron Lepofsky’s book,
The Manager’s Guide to Web Application Security,
published by Apress Media

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively.

Home | Technology Audits | Compliance Audits | Process Audits | Doc Audit/Authorship| | 7x24 Monitoring | Knowledge Transfer
ERE Differentiators | About Us | Site map | Contact Us | |   | Resource Center
Copyrights © 2007-2008. All rights reserved.  

   AddThis Social Bookmark Button