Your financial services firm has unique IT needs.

We have the right process and tools to meet them.

Our process consists of four stages:

Stage 1

Assess

Stage 2

Plan

Stage 3

Implement

Stage 4

Support

Assess

This is where we learn your business inside and out by running multiple assessments. Our assessments fall into three main categories: 

Strategic Technology Assessment

During this assessment, we evaluate all of your hardware, line-of-business apps and software, security, business reliance, policies, procedures and regulatory compliance requirements. 

Cybersecurity/Risk Assessment

We’ll methodically review your IT systems to uncover any issues relating to stability, reliability, security gaps and other vulnerabilities. We use a blended framework, based on 25+ years of experience serving investment companies, that also incorporates and expands upon FINRA’s small first cybersecurity checklist.  

Industry/Regulatory Compliance

We’ll dig deeper into the regulatory compliances for your specific sector, which might include the New York Department of Financial Services (NYDFS) Cybersecurity Regulation (23 NYCRR 500), U.S. Securites and Exchange Commission (SEC), FINRA, the NY SHIELD Act and the European Union’s The Alternative Investment Fund Managers Directive (AIFMD).

Since assessments are such a valuable part of tracking your progress and proactively identifying any emerging threats or issues, we run them quarterly 

Cybersecurity Risk Gap Analysis
Completing this will provide an estimate to analyze your risks related to technology and cybersecurity for your company.
+
Please choose an option☝️!
Please choose an option☝️!

Total 0

Plan

This is where we develop a plan together based on your assessment reports. We’ll define the goals for the current cycle while mapping out how to address any security gaps, vulnerabilities and performance issues.

We’ll regularly review your plan to measure its progress and make updates as needed based on any new business realities.

Implement

This is where we convert your plan into action. We’ll get to work on increasing your cybersecurity, improving your regulatory compliance, streamlining your operations and repairing any long-term IT issues. Throughout the implementation phase, we’ll update you via a Monthly Executive Report on work progress and completion.

Support

This is where we monitor, manage and support your daily IT needs. Monitoring makes sure we catch any suspicious activity early. Management means we help remediate any current and emerging IT risks. Our support team is there for you whenever an IT issue arises, and you just need help to get back on track.

“Raffi Jamgotchian’s chapter 31, What is a Security Framework, in the book, On Thin Ice is a must read. He lucidly defines them, describing the most common ones. Raffi then goes on to demystify the “pyramid of security” in easy-to-understand steps, so you have a comprehension and comfort with the terminology and importance of security. In twenty minutes, I went from knowing very little to a working knowledge, which every business executive should have.” 

Parag Saxena, CEO, Vedanta Capital Management