Content tabs module

Compliance can be a powerful lever in strengthening your Cybersecurity “Defense in Depth” strategy; however, compliance and security are not one and the same. Compliance is the measurement, or reporting snapshot, of how security is being managed and maintained at a given point in time. Security is the protection of how your data and systems are used, stored and delivered to the end-user, all the time. Trexin can assess, remediate and help build a sustainable continuous compliance program.

Help section

Help me establish my compliance processes

Trexin understands the various regulatory organizations such as HIPAA, PCI, SOX and how they connect the business functions with technology assets. The criticality of compliance efforts working in conjunction with security practices is more important than ever as threats – internal and external – are relentlessly seeking ways to get at your data. Beginning with a firm understanding of your compliance goals, Trexin can assist with the selection of a framework, assess your current state, or determine the most effective compliance program for your organization.

Areas of Expertise:

  • Compliance
  • process
  • assessment
  • data protection
  • security
  • PCI
  • SOX
  • Sarbanes-Oxley
  • healthcare
  • finance
  • framework

Help me with red flag remediation

A “red flag” is the term used by auditors when a compliance violation is discovered which can represent serious implications to your business depending on the regulatory method and impacted area. Prevention of a formal finding is just as necessary as swift and surgical remediation of one, and you are likely in one or both scenarios as you read this. Trexin’s experts analyze your environment and work with you to create appropriate prevention and remediation plans.

Areas of Expertise:

  • Audit
  • findings
  • red flag
  • remediation
  • penalty
  • controls

Help me assess my cyber risk

Assessment of your current risk profile is the only way to properly determine where you need to go, how fast and in what priority order. Data is updated throughout your environment so understanding who has access to it, where it goes, how it gets there and where the copies and backups are help identify current gaps and weaknesses. Trexin consultants can plan and lead assessments that pinpoint your exact location in the risk universe and help map the journey to a better place of your choosing.

Areas of Expertise:

  • Assessment
  • risk profile
  • risk assessment
  • data protection
  • access
  • rights
  • least privilege
  • weakness
  • gap
  • flow
  • rest
  • store
  • backup
  • copy

4th Annual IT Hacking Conference

On October 26th Trexin’s Chief Security Officer, Glenn Kapetansky, joined a panel of colleagues including Waqas Akkawi (SIRVA Worldwide), Richard Rushing (Motorola Mobility), Erik Devine (Riverside Hospital) and moderator Tina LaCroix-Hauri (Northwestern University) at the 4th Annual IT Hacking Conference in Chicago.

Tagged in: Cybersecurity
Social Media Accounts