Security Program and Strategy Understand and manage evolving cyber threats with confidence. Protiviti’s cybersecurity strategy experts help organizations understand information security and privacy risks while providing creative solutions. We help our clients take a holistic business and technology view of their risk posture, and we use industry-accepted information security frameworks to evaluate current capabilities. To reduce exposures, we develop and refine security and privacy strategies, practices, and technology architectures.Boards of directors and executives face challenges ranging from the speed of technology innovation and the dynamic regulatory landscape to evolving cyber threats, the security talent gap, and ever-changing economic expectations.Protiviti can assess your unique environment and provide a roadmap so you can make smart cybersecurity strategy investments to serve your customers and grow your business. Better understand and manage your organization's cyber risks Our Cybersecurity Strategy Services Pro Briefcase Assess Cybersecurity Risks Understand and prioritize cyber risks based on your unique risk landscape and cybersecurity maturity. Pro Building office Assess Capabilities Leverage industry frameworks and our depth of expertise to understand current capabilities and create a roadmap towards the target security posture. Pro Document Consent Program Benchmarking, Strategy, and Governance Assess your organization against industry benchmarks and design a go-forward structure. Pro Document Files Board Communication and Reporting We provide support for meaningful cybersecurity strategy discussions with senior leadership and the board. Pro Document Stack Cyber Program Office Cybersecurity risks are never static. A successful cyber program office adapts accordingly. Our team serves as an on-demand “virtual CISO” providing hands-on support, transparency, and structure to respond to changing demands. Featured insights IN FOCUS The DoD unveils the Cybersecurity Maturity Model Certification Program: A primer for defense contractors As cybersecurity threats evolve, the U.S. Department of Defense (DoD) has introduced a long-awaited pivotal framework aimed at bolstering the security of its national defense supply chain: The Cybersecurity Maturity Model Certification (CMMC) Program... INSIGHTS PAPER Best Practices for Building a Sustainable PCI DSS Compliance Program Creating and maintaining a sustainable PCI DSS compliance program is a crucial and complex task for organizations to protect payment card transactions and uphold consumer trust. However, despite the PCI DSS standard being around for almost 20 years,... BLOG Low-Code Applications Yield High Value, Big Change in Less Time The big picture: Deploying enterprise technology systems and tools often is cumbersome and hampered by complex configurations, lengthy implementations, extensive testing and big dollar budgets. Low-code applications can alleviate these challenges by... VISION CPO or no? Protiviti’s Tom Moore on the evolution of the privacy role and its uncertain future When Google, a company estimated to hold between 10 and 15 exabytes of data — or the storage power of about 30 million PCs — makes a potentially game-changing decision regarding privacy, it’s probably a good idea for the rest of us to take note. ... SURVEY From AI to Cyber - Deconstructing a Complex Technology Risk Landscape Protiviti’s global internal audit survey 2024 highlights the challenges and technology risk trends faced by internal auditors worldwide. Download the report. VISION Protecting data and minimizing threats with Microsoft’s Sarah Armstrong-Smith “When we're talking about cyber-attacks, data breaches, intellectual property theft, whichever way you want to look at it, ultimately it'll come down to one thing, which is effective data governance.” “A couple of months ago Microsoft actually... Button Button Make smart cybersecurity strategy investments World-class security A world-class security organization is nimble, efficient, self-improving, adaptive, and effective. Protiviti helps you maintain your cybersecurity strategy to your specifications and remains aligned with your business objectives. Make smart cybersecurity strategy investments Leading the way on cyber risk quantification As the founding advisory partner to the FAIR Institute, Protiviti provides the FAIR Institute with experience, thought leadership, and sponsorship to promote the adoption and growth of FAIR. Leadership Chip Wolford Chip is a Managing Director in Protiviti’s Technology Consulting practice focusing on Data Security & Privacy. He presently leads Protiviti’s Data Security practice and focuses on Payment Card Industry and Healthcare Information Security as well as supporting ... Learn More Perry Keating Mr. Keating is the Managing Director and President of Protiviti Government Services (Pro Gov) with over 30 years of doing business with the government and the Defense Industrial Base (DIB). His experience gives him unique industry insight into the Public Sector (US ... Learn More Torin Larsen Torin leads Protiviti’s Cybersecurity practice in the Pacific Northwest. He has over 18 years of consulting experience, and has extensive experience working with high tech, retail, telecommunications, and software companies.Major ProjectsActed as a Virtual CISO for a ... Learn More Nick Puetz Nick Puetz is a Managing Director with over 20 years of cyber experience. While focused on helping organizations design, build and mature their cybersecurity programs, Nick’s areas of expertise extend to cyber program strategy and metrics, security operations, offensive ... Learn More Sameer Ansari Sameer Ansari is a Managing Director and leader of Protiviti’s Security and Privacy Practice. Sameer brings more than 20 years of experience developing and delivering complex privacy solutions to the Financial Industry, and privacy consulting and implementation ... Learn More What is next for CISOs? The CISO Next initiative produces content and events crafted exclusively for CISOs, with CISOs. The resources focus on what CISOs need to succeed. The first step is finding out “What CISO type are you?” Get Involved Case Studies Risk mitigation through cybersecurity strategy and programming Situation: This international, not-for-profit healthcare provider operating over 60 hospitals and 350 clinics in four countries knew its high-priority business demands created issues with information security. Business leaders lost confidence in the organization’s delivery quality and ability to protect its digital assets. Value: A long-standing relationship with Protiviti yielded significant improvements in the client’s cybersecurity capabilities, programme maturity, and risk mitigation. Critical outcomes included a 53% reduction in superfluous active directory (AD) groups and the standardization of AD management tool kits, a reduction in phishing campaign testing click-through and compromise failures from 15% to 7%, and a risk indicator reduction of an average of 80%. Financial services firm gains greater control of global cybersecurity position Situation: The fast-track growth of an international financial services firm through numerous acquisitions led to security challenges. Value: We improved the client’s security posture through standardization of patching and remediation—implemented across the enterprise—gaining real-time status on the environment. We enhanced the visibility of cybersecurity and data privacy risks across key business units. Protiviti helps financial services firm tighten cybersecurity and technology control Situation: A leading corporation in the financial services and insurance industry acquired several companies without conducting robust due diligence, neglecting to identify cyber risks and to strategize seamless integration with the existing IT infrastructure. Value: With enhanced cybersecurity metrics, the client increased its visibility of cybersecurity and data privacy risks to internal business partners for each targeted company acquisition. The client integrated enterprise security policies and standards into the vendor procurement process to mitigate third-party risks. Supporting and documenting cybersecurity strategies for an international bank Situation: An international bank wanted to define and document its three-year cyber security strategy. Value: The bank gained a digital visualization of the control blueprint, giving users a quick snapshot of threat analysis activity and the ability to gauge the necessary actions to further reduce risk.