SECURITY HEALTH CHECK BATTLECARD
Questions
Want to know how susceptible you
are to a cyber attack?
Need to identify and document
detailed threats and risks?
Need a documented, prioritized,
and socialized plan for how to
remediate and manage risk?
INTERNAL USE ONLY
Potential Services
Deliverables
In order to determine your organization’s susceptibility to external Internet-based attacks, you must
periodically perform the same types of attacks that the cyber criminal performs daily.
Security Assessment Report and Executive Summary
Full risk analysis and recommendations
Security Health Check—Technical testing to identify and document current security vulnerabilities
and, most importantly, potential exploitation areas. What will the “bad guy” use to get in?
Services provided:
• External Penetration Testing (Ethical Hacking)
• Wireless Penetration Testing (Ethical Hacking)
• Phishing, Vishing, and Social Engineering Testing
• Firewalls Configuration Review and Audit
• Routing/switching Configuration and Security Evaluation
• Server and Domain Evaluation
• Security Organization and Policy Review
• Detailed and prioritized Security Risk Report and Remediation Plan
Detailed technical findings
Security Risk Report and Remediation Plan
Need to meet compliance
standards, such as HIPAA, PCI,
GLBA, FFIEC, NCUA, SOX, ISO 27K,
FISMA, FedRAMP, and FERPA?
C-/17
1
SECURITY HEALTH CHECK BATTLECARD
Possible Customer Concerns
Follow Up
Do you have the ability to detect whether you’ve been compromised or breached, i.e., is the hacker already
on the inside?
I’ve experienced a security breach
or event. I’m concerned about
our ability to keep the “bad guys”
out. I need to conduct regulatory
and compliance testing.
When was the last time you tested for the above condition?
I need to reduce complexity,
increase our level of protection,
and improve my ability to detect
and react to threats.
Why should I partner
with Connection?
Resources
Security Practice Service Managers
Robert DiGirolamo--
When was the last time you assessed your organization’s overall compliance (with HIPAA, PCI, GLBA,
FFIEC, NCUA, SOX, FISMA, FedRAMP, or FERPA)? How confident are you that your organization meets
your required policies or compliance standards?
Matthew Lipkin--
What is your management team’s understanding of their role with cyber security, and does the
organization have a documented response plan to cyber attacks?
Security Ticket Main Distribution List:
Does your organization have a documented owner for IT security risk management, planning,
implementation, and compliance?
Our organization lacks a
comprehensive security
program or plan.
INTERNAL USE ONLY
Do you have a documented comprehensive security protection, detection, and reaction strategy to include
the people (roles), process (policy and controls), and technology to keep you secure?
TSG—Security/Mobility Tickets-SSS RESOURCES—KEENE
Security—Robyn McIntosh .......... x33404
SSS RESOURCES—MARLBOROUGH
What resources does your organization use to make sure they are updated on the latest
threat intelligence?
Security—Robyn McIntosh .......... x33404
How do you respond to breaches or security events?
Security—Corey Jimmo .................. x33400
Are you concerned that the investment made in your security technology may not be keeping you safe
and secure?
SSS RESOURCES—MERRIMACK
Does your security plan or program match your technology capabilities?
SSS RESOURCES—PORTSMOUTH
Security—Corey Jimmo .................. x33400
SA RESOURCES
Our IT Security Team has been built from the ground up to help you solve your toughest security
challenges. From our experienced engineers to our Security Practice Director, industry-leading security
expert Stephen Nardone, we know the issues today’s security risk owners must deal with—and we know
how to solve them.
N. East—Justin Baron ....................-
Connection’s extensive investments in engineering resources and deep partnerships with leading vendors
mean we’re able to deliver cutting-edge security solutions and services. Our innovative offerings can help
you defend against today’s sophisticated cyber threats.
S. East—David Kinser ..................... x74517
We serve the security needs of every size organization, from the largest enterprises to the smallest
companies. Our experts have seen it all, and they can leverage that experience and expertise to create
advanced security solutions for your unique environment.
N. Central—Brian Kelly ................... x74597
East—Jose Rodriguez ....................-
M. Atlantic—William Ball ............... x74532
N. Central—David Sharp ................ x74534
N. Central—Frank Kuczynski ........ x77836
S. Central—Jonathan Copeland .... x77693
Pac. West—Scott Crawford ........... x77613
C-/17
2