Critical Infrastructure Protection

Cybersecurity  +  Compliance  +  Managed Services



October 2017

September 2017

August 2017

July 2017

Customized Solutions Developed for NERC Client

ITEGRITI built a custom database tool for a client that combined all the various NERC inputs and tools (i.e. Evidence Request Spreadsheet, RSAWs, Standards, etc.) and supplemented them with information developed and retained by the […]

June 2017

CIP Audit Package Development and QA

ITEGRITI helped bring an entire CIP audit package together for a large utility client to ensure that compliance narratives, evidence references, and supporting evidence all aligned, was appropriately cross-referenced, and addressed the requests from the […]

ITEGRITI Speaking @ GCPA Fall 2017

ITEGRITI will be speaking on “Compliance vs. Cybersecurity” as part of a panel discussion at the Gulf Coast Power Association (GCPA) Fall Conference 2017, Oct. 3 – 4 In Austin, TX.

Event […]

March 2017

Cybersecurity Controls Program Development

ITEGRITI reviewed the cybersecurity controls for a $1B organization and compared the controls in place to a set of baseline cybersecurity controls used to determine overall program efficacy. By performing this analysis, several areas of […]

Clarity to Complex Cyber Compliance Issues

Not every area of IT compliance is clear cut. ITEGRITI helped one client define and clarify it’s positions in areas where more ambiguity exists, working with the client to develop, document, and articulate its rationale […]

February 2017

CIP Compliance for Lows

ITEGRITI developed a CIP compliance program to support a client with “Low Impact” only cyber assets that is both sustainable and manageable by working with our client to identify already existing processes that were augmented […]

January 2017

ITEGRITI in the News

ITEGRITI is interviewed by large U.K. based risk magazine and urges readers to implement strong cyber-hygiene controls.


December 2016

Cybersecurity Baseline Controls Evaluation

ITEGRITI assisted a $100M client by reviewing their actual cybersecurity processes against a recognized baseline of cybersecurity controls to assess the health of their cybersecurity program.  The review included the set cybersecurity controls that can […]

Go to Top