I recently attended a Family Office Summit and am starting to formulate what might go into a managed cybersecurity offering to address their particular combination of digital and physical asset risk, reputation and infrastructure/services exposures. What would you add to this initial list? - Executive Protection Services (physical security team) - Mobile Security / MDM - Home Security (wifi, router, IoT review) - Darkweb and Clearweb Identity and Social Media Monitoring - Third-Party Continuous Monitoring (lawyers, foundations, real estate etc)

305 views3 Comments
Sort By:
Oldest
Director of IT in Government4 months ago
What do you think about using the basic cyber hygiene (implementation group 1) from https://www.cisecurity.org/ as a guideline? I use this when assessing the cyber security posture of larger organizations and I wonder how this would scale for your offering. All the best!
Group Director of Information Security in Banking4 months ago
Would be easier for you create a managed service offering once you undertake an initial inventory and assessment of :
1. Their information assets spread out and their hosting mechanism, i.e. are they hosted on an on-prem DC, single / multi CSP model etc. 
2. Are they into active application development mode or usually buy their applications off the shelf (e.g. exchange online, SAP ERP etc.).
3. Their networking switches, routers and links connecting to cloud. multi location offices and who has it maintenance?
4.  Licensing / Costs of 1-3. Are they in or out of warranty? 
Once you have above 4, rest will follow and define the next steps in a clearer manner.
HTH
lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
Director of Information Security in IT Services4 months ago
Security Posture review of accounts/tenants in primary SaaS applications they use (e.g. Office, Google Workspace, etc).

Content you might like

Director of IT in IT Services4 days ago
Implementation of Zero trust architecture, its modules across the organisation is a priority for us. So, we will be implementing zero trust strategies in IAM, inline with overall strategy.
1.4k views1 Comment

Implementation complete23%

Implementation in progress54%

Planned within the next 12 months12%

Not planned7%

Not enabling O365 on mobile2%

View Results
2.4k views2 Upvotes

Yes79%

No20%

5k views3 Comments