ERE Information Security Auditors
Home | Site Map | Contact Us |  Resource Center
This text is replaced by the Flash movie.
list of IT security and compliance audit steps
ERE Differentiators from other vendors

Documentation Audit and Authorship Service

ERE pretexting audit

Several current business drivers compel the need for up to date and enforceable policy:

  • Increasing emphasis on corporate transparency.
  • Demand for accuracy of financial reporting.
  • Privacy and identity theft related liability.
  • Executive accountability.
  • Information security transitioning into governance.

ERE Documentation Model
ERE CISSP security consultants write security plans, policy, controls, and procedures, tailored to the exact needs of each individual client. ERE bases the documents on our standard template policy / procedures model. The key aspects of the ERE policy / procedures model are:

  • Living documents, to be regularly kept updated by the owner.
  • Each idea is written in point form, designed for ease of use in pressure situations.
  • Dual purposed, both an information source and for note taking during incident response.
  • Excel based for ease of note taking during incident response, and for ease of update by the owner.
  • Modularly written, to facilitate ongoing development and correlation of new components of the documentation set.
  • Practical as each document is tuned to each client's specific needs.
  • Usable, as ERE includes on-site training with PowerPoint presentations.

    
Additional Resources
http://csrc.nist.gov/publications/CSD_DocsGuide.pdf

 

Contact Us

905 764 3246

 
 
  Budgetary Price Quote
  10 minute scope definition call
  ROI Calculation for your next Audit 
  Sanitized Statement of Work
  Sanitized Audit Report
  Product Literature  
  White Papers and Published Articles
   
  Please see Ron Lepofsky’s book,
The Manager’s Guide to Web Application Security,
published by Apress Media

http://www.apress.com/9781484201497

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively.

 
information security and compliance auditors
Home | Technology Audits | Compliance Audits | Process Audits | Doc Audit/Authorship| | 7x24 Monitoring | Knowledge Transfer
ERE Differentiators | About Us | Site map | Contact Us | |   | Resource Center
Copyrights © 2007-2008. All rights reserved.  

   AddThis Social Bookmark Button