DrawbridgeConnect™

BRIDGING THE GAP BETWEEN INFORMATION SECURITY, TECHNOLOGY, AND COMPLIANCE

Manage all aspects of your cybersecurity program with DrawbridgeConnect™. DrawbridgeConnect™ is a platform that allows Firms to comply with regulatory requirements, due diligence, and industry frameworks and best practices for cybersecurity in a fully centralized application.

Cyber Risk Assessment

Identify the cybersecurity risks within your organization. Review all aspects of your Firm’s IT infrastructure and controls against regulatory requirements, due diligence requirements, and industry best practices. Gain insight into your current cybersecurity state and your suggested roadmap for program improvement.

icon-track
icon-vulnerable

Vulnerability Management

Conduct ongoing vulnerability management and testing of your internal and external network. Learn more about this service here.

Vendor Due Diligence

Manage the vendor due diligence process from end to end by creating and sending out due diligence questionnaires, aggregating and tracking data, and managing information and vendor responses. Gain insight in the current state of your vendors’ cybersecurity programs and where the Firm may have data risk that lies outside of your organization. You are still responsible!

icon-send-documents
icon-flow-chart

Policy Creation

Gather and manage all information to easily create policy documentation. This includes Written Information Security Policies, Incident Response Plans, and other Security Policies your organization may need.

Training & Awareness

Manage your Firm’s cybersecurity training and awareness program. In many cases, the greatest cyber risk to a Firm are its employees.

icon-online-training
icon-secure-document

Data Privacy

Conduct a data mapping exercise to understand where confidential data lives on your network. Gather and manage information to create privacy policy documentation and meet your regulatory requirements. Gain insight into the current state of your data privacy program and your suggested roadmap for improvement.

Business Continuity & Physical Security

Conduct a business impact analysis to manage and assess your business continuity and physical security programs. Gain insight into managing risk around business continuity and physical security.

icon-security