Menu

Cybersecurity

The cyber threat landscape is evolving at an unprecedented rate. Adversaries are more sophisticated, better equipped, and increasingly backed by well-funded criminal groups and nation states. At the same time, technology is transforming the way business is conducted through automation, digitization, and ubiquitous mobile connectivity. These advances, if not fully understood, could heighten security risks.

Treliant’s Cybersecurity team is comprised of experienced, certified professionals that assist organizations in three critical areas: cybersecurity threats, data regulation, and emerging technology. In the face of cybersecurity threats, we help organizations protect critical information assets and respond to attacks. In the regulatory sphere, we support clients’ compliance with expanding cybersecurity, privacy, and data breach notification regulations and frameworks. And, as organizations deploy emerging technology to drive business value, we help them identify and manage risks while meeting strategic objectives. 

Treliant’s engagements range from basic information security health checks to comprehensive security program reviews, in-depth architectural risk analyses, and v-CISO functions. 

Treliant's Cybersecurity Services Include:

Program Reviews and Development

  • Establishing, developing, and reviewing cybersecurity policies, procedures, programs, and standards
  • Helping organizations identify critical information assets, protect from current and emerging cybersecurity threats, detect anomalous or malicious behavior, respond to attacks, and recover safely

Regulatory Compliance and Risk Assessments

  • Performing assessments against specific regulatory guidance on cybersecurity, privacy, and data breach notification
  • Helping organizations comply with regulations and frameworks including the New York State Department of Financial Services’ (NYDFS) Cybersecurity Requirements (23 NYCRR 500), Federal Financial Institutions Examination Council’s (FFIEC) Cybersecurity Requirements, National Institute of Standards and Technology’s (NIST) Cybersecurity Framework, Society for Worldwide Interbank Financial Telecommunication’s (SWIFT) Customer Security Controls Framework, Information Systems Audit and Control Association’s (ISACA) COBIT 5, International Standards Organization’s (ISO) 2700x, and others

Training Programs

  • Establishing, reviewing, and conducting cybersecurity training programs
  • Reviewing and running sessions, such as war gaming, incident response tabletop exercises, and employee phishing assessments

Third-Party Risk Review and Development

  • Performing risk management reviews over the entire life-cycle, from initial vendor selection, vendor due diligence, and contracts through ongoing analysis

v-CISO

  • Providing strategic and operational leadership for organizations that do not have a full-time, dedicated resource, while meeting the requirements of regulations calling for a dedicated CISO
  • Participating in regulatory reviews involving the Office of the Comptroller of the Currency (OCC), Federal Reserve Bank (FRB), Securities and Exchange Commission (SEC), state regulators, and others
  • Providing select CISO services including business continuity planning and assessment as well as security and threat intelligence

Emerging Technology and Innovation Security

  • Helping organizations mitigate security risk while realizing the business benefits of emerging technologies
  • Providing security expertise for innovations including mobile, robotic process automation, application programming interfaces, artificial intelligence, biometrics, the Internet of Things, distributed ledger technology, and others

Infrastructure and Application Security

  • Ensuring that security controls are included at all stages of the Secure Systems Development Life Cycle (SDLC) and across all elements of the infrastructure
  • Facilitating penetration testing, code reviews, static and dynamic testing, and architectural risk analysis


If your needs are not addressed by the advisory services listed above, view more of our Services or 

Ask Us a Question

Contacts