Client determined that a comprehensive security operations assessment and gap analysis of their current Process and Technologies deployed in the environment should be conducted and a strategic plan developed to address the overall organizational security operation’s needs.
Leading provider of Quality Management tools on SaaS platforms.
The client wanted to move from a legacy architecture to one based on Microservices and cloud platforms. In addition, there was no formal and consolidated security function within the organization or a roadmap for security and compliance.
National medical group providing treatment for the chronic disease of addiction.
The Company needed an assessment of their current security posture, relating specifically to CIS Controls, network and application security, and asset management.
National pharmaceutical wholesaler serving health systems, government, and the Department of Defense.
The Company needed to conduct a comprehensive NIST CSF assessment and gap analysis of current Process and Technologies deployed in the environment and develop a strategic plan to address the overall organizational security operations needs.
Leading provider of Learning Management Solutions for Healthcare customer on SaaS platforms.
Client is a publicly traded Healthcare solutions company experiencing dynamic growth in both customers and application solutions. ISG developed and implemented a Security program that included Security Operations, Threat Hunting, Application and Cloud Security and implementing a DevSecOps model.
Provider of Telecom Management and Sourcing Solutions
Client engaged ISG to respond to an incident the Technology Team discovered after an executive’s email was breached. ISG consultants responded to the incident and conducted a forensics investigation on client’s systems both on premise and cloud based.
Leading provider of marketplace and group booking platforms for the hotel industry.
Client was challenged by security issues in their multiple AWS environments and needed assistance configuring operational access and designing a security roadmap for future growth.