HIPAA & PCI Cyber Health Check
ITEGRITI assisted a client concerned with HIPAA and PCI risks by reviewing baseline cybersecurity controls to assess the health of their cybersecurity program.
Multistate Cyber Change Management Training
ITEGRITI assisted a client in establishing the necessary communication and training plans for effective organization change ...
Audit Prep for Largest Grid Cyber Audit Ever
ITEGRITI assisted a large utility client prepare for a CIPv5 Multi-Region (MRRE) audit by reviewing compliance evidence and preparing the SMEs for audit through training and ...
Ransomware & Persistent Threat Recovery
ITEGRITI assisted a logistics company deal with the impact of a ransomware event and a unknown persistent threat actor.
Removable Media and Transient Device Program
ITEGRITI developed a program and set of controls for a client to address risks around the issues related to "Removable Media" (USB drives, Recordable CDs, SD Cards, etc.) ...
“Root Cause” Analysis of Systemic Cyber Issues
ITEGRITI provided one client with deep analysis to determine the "root cause" of systemic and repeated cybersecurity issues that had undergone several attempts ...
Featured Projects
HIPAA & PCI Cyber Health Check
ITEGRITI assisted a client concerned with HIPAA and PCI risks by reviewing baseline cybersecurity controls to assess the health of their cybersecurity program.
Efficient, Repeatable CIP Validation Process
ITEGRITI designed and implemented a CIP assessment process for a large utility that increases the efficiencies in gathering and evaluating compliance evidence, yet still firmly rooted in the NERC data request approach. Highly accurate and [...]
Multistate Cyber Change Management Training
ITEGRITI assisted a client in establishing the necessary communication and training plans for effective organization change ...
Audit Prep for Largest Grid Cyber Audit Ever
ITEGRITI assisted a large utility client prepare for a CIPv5 Multi-Region (MRRE) audit by reviewing compliance evidence and preparing the SMEs for audit through training and ...
Operationalized Cybersecurity Procedures with SME Feedback
ITEGRITI worked with a client to achieve the goal of making cybersecurity policies and procedures operational. Leveraging our leadership and industry experience, ITEGRITI solicited input and feedback from subject matter experts (SMEs) across nine areas [...]
CIPv5 CVAs (Cyber Vulnerability Assessment)
ITEGRITI has provided both Paper and Active Cyber Vulnerability Assessment services to multiple energy clients that are directly aligned with regulatory expectations related to CIPv5 CVAs. ITEGRITI experts utilize an assessment methodology for our NERC [...]
Customized Solutions Developed for NERC Client
ITEGRITI built a custom database tool for a client that combined all the various NERC inputs and tools (i.e. Evidence Request Spreadsheet, RSAWs, Standards, etc.) and supplemented them with information developed and retained by the [...]
Ransomware & Persistent Threat Recovery
ITEGRITI assisted a logistics company deal with the impact of a ransomware event and a unknown persistent threat actor.
CIP Audit Package Development and QA
ITEGRITI helped bring an entire CIP audit package together for a large utility client to ensure that compliance narratives, evidence references, and supporting evidence all aligned, was appropriately cross-referenced, and addressed the requests from the [...]
Removable Media and Transient Device Program
ITEGRITI developed a program and set of controls for a client to address risks around the issues related to "Removable Media" (USB drives, Recordable CDs, SD Cards, etc.) ...
Training to Improve Evidence & Processes
ITEGRITI improved the evidence of a cybersecurity department through training and real time, "live", advisory services via conference calls. As a result, cybersecurity process evidence that initially had a rejection rate for insufficient evidence by [...]
Cybersecurity Risk Evaluation
ITEGRITI performed a cybersecurity risk evaluation for a company seeking to provide assurance to its cybersecurity insurance provider. The assessment included reviewing network infrastructure and cybersecurity process controls and evaluating those processes against a baseline [...]