{"id":473,"date":"2017-03-30T18:39:32","date_gmt":"2017-03-30T18:39:32","guid":{"rendered":"http:\/\/72.52.228.46\/~itegriti\/?p=473"},"modified":"2021-04-12T02:59:39","modified_gmt":"2021-04-12T02:59:39","slug":"cyber-controls-development","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/","title":{"rendered":"Cybersecurity Controls Program Development"},"content":{"rendered":"<p>ITEGRITI reviewed the cybersecurity controls for a $1B organization and compared the controls in place to a set of baseline cybersecurity controls used to determine overall program efficacy. By performing this analysis, several areas of improvement were identified and the organization was better able to visualize its overall cybersecurity posture, articulate its control environment to board members and investors, and reduce cybersecurity risk.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ITEGRITI reviewed the cybersecurity controls for a $1B organization and compared the controls in place to a set of baseline cybersecurity controls used to determine overall program efficacy. By performing this analysis, several areas of improvement were identified and the organization was better able to visualize its overall cybersecurity posture, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Controls Program Development - kw022024<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Controls Program Development\" \/>\n<meta property=\"og:description\" content=\"ITEGRITI reviewed the cybersecurity controls for a $1B organization and compared the controls in place to a set of baseline cybersecurity controls used to determine overall program efficacy. By performing this analysis, several areas of improvement were identified and the organization was better able to visualize its overall cybersecurity posture, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-30T18:39:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-12T02:59:39+00:00\" \/>\n<meta name=\"author\" content=\"Michael Sanchez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@itegriti\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Sanchez\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/\"},\"author\":{\"name\":\"Michael Sanchez\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/48fee36290b34e574ee630a458a4e7bd\"},\"headline\":\"Cybersecurity Controls Program Development\",\"datePublished\":\"2017-03-30T18:39:32+00:00\",\"dateModified\":\"2021-04-12T02:59:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/\"},\"wordCount\":67,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/\",\"name\":\"Cybersecurity Controls Program Development - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"datePublished\":\"2017-03-30T18:39:32+00:00\",\"dateModified\":\"2021-04-12T02:59:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Controls Program Development\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/48fee36290b34e574ee630a458a4e7bd\",\"name\":\"Michael Sanchez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0c47a53426b8d138686ed3c71adc554e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0c47a53426b8d138686ed3c71adc554e?s=96&d=mm&r=g\",\"caption\":\"Michael Sanchez\"},\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/itegriti\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Controls Program Development - kw022024","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Controls Program Development","og_description":"ITEGRITI reviewed the cybersecurity controls for a $1B organization and compared the controls in place to a set of baseline cybersecurity controls used to determine overall program efficacy. By performing this analysis, several areas of improvement were identified and the organization was better able to visualize its overall cybersecurity posture, [&hellip;]","og_url":"https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2017-03-30T18:39:32+00:00","article_modified_time":"2021-04-12T02:59:39+00:00","author":"Michael Sanchez","twitter_card":"summary_large_image","twitter_creator":"@itegriti","twitter_site":"@itegriti","twitter_misc":{"Written by":"Michael Sanchez"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/"},"author":{"name":"Michael Sanchez","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/48fee36290b34e574ee630a458a4e7bd"},"headline":"Cybersecurity Controls Program Development","datePublished":"2017-03-30T18:39:32+00:00","dateModified":"2021-04-12T02:59:39+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/"},"wordCount":67,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/","url":"https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/","name":"Cybersecurity Controls Program Development - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"datePublished":"2017-03-30T18:39:32+00:00","dateModified":"2021-04-12T02:59:39+00:00","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2017\/news\/cyber-controls-development\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Controls Program Development"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/48fee36290b34e574ee630a458a4e7bd","name":"Michael Sanchez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0c47a53426b8d138686ed3c71adc554e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0c47a53426b8d138686ed3c71adc554e?s=96&d=mm&r=g","caption":"Michael Sanchez"},"url":"https:\/\/itegriti.com\/kw022024\/author\/itegriti\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/473"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=473"}],"version-history":[{"count":2,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/473\/revisions"}],"predecessor-version":[{"id":556,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/473\/revisions\/556"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}