Audits, Data Mapping & Asset Leveraging

Effective cybersecurity practices require regular cybersecurity audits. While security audits typically cover cyber risk assessments, mitigation and remediation capabilities, overlooking developments in the legal landscape can create compliance blinds spots. Clients that take a proactive approach to developing cybersecurity policies and procedures and performing regular legal audits will be better able to navigate the risk environment and legal compliance ranging from critical infrastructure to privacy rights.

  • Industry cyber controls standards analysis
  • Records/data analysis
  • Data set licensing and leveraging analysis 
  • Supply-chain access analysis
  • Retention policies/schedules
  • Extraterritorial processing and data transfer compliance
  • Remediation of legacy data
  • Data access requests and compliance