Treliant’s Cybersecurity & Privacy team of experienced, certified professionals partner with organizations to plan for and identify cyber risk and threats.
We help organizations develop appropriate and sustainable cyber, information security, and privacy programs that perpetually improve and mature. We support clients’ compliance with expanding cybersecurity, privacy, and data breach notification regulations. Our goal is to assist in identifying and driving business value, by helping companies manage risks while meeting strategic objectives.
Performed the role of Chief Information Security Officer for foreign banking organizations
Managed their cyber and information security programs, assisting to close Matters Requiring Attention (MRAs) related to cyber and information security, and helping to satisfy requirements from the New York State Department of Financial Services (NYDFS) and the Federal Reserve Bank of New York.
Conducted an information technology current state and capabilities assessment for a FinTech lending company
Treliant reviewed the company’s technology platforms, business processes, and strategic objectives to develop a gap analysis. We provided recommendations and assisted in implementing a strategic road map to remediate the gaps.
Developed business continuity, disaster recovery, and business resiliency programs for NYDFS-supervised companies
Program development included: documentation, planning, testing, reporting, training, and all aspects of the companies’ regulatory requirements and business objectives.
Treliant has a proven track record of consulting in the following areas:
Governance and Risk Management
Cyber, privacy, and IT risk assessments, including but not limited to compliance with the New York State Department of Financial Services (NYDFS), Securities and Exchange Commission (SEC), the European Union’s General Data Protection Regulation (GDPR), and California’s Consumer Privacy Act (CCPA), as well as leading industry frameworks from the National Institute of Standards and Technology (NIST), International Standards Organization (ISO), and Information Systems Audit and Control Association (ISACA’s COBIT 5)
Policies and procedures development, implementation, and testing
Penetration testing and vulnerability scanning
Vendor and Third-Party Risk Management Program Development
Policies and procedures
Due diligence reviews, baselining to mergers and acquisitions
Training Program Development
End-user awareness classes, videos, and workshops
Executive leadership cyber business risk, threat, and impact awareness
Email phishing exercises
Policies and procedures and role-based training
Incident Preparation, Response and Recovery
Cyber incident scenario playbook development
Threat intelligence support
Business continuity, disaster recovery, and business resiliency