Content tabs module

Capability ExpertiseCybersecurityEnterprise Risk Management
All organizations face risk events that may severely damage customer relationships, intellectual property, branding, and revenue. Understanding what those risks (and opportunities) are, the impacts on your business, and your response options will prepare you in advance. Trexin’s deep expertise in the identification, management, and planning of such events will give you an edge over your competition.

Help section

Help me assess my key assets, current capabilities, and overall risk profile

Assessment of your current risk profile is the only way to properly determine where you need to go, how fast and in what priority order. Our assessment begins with a comprehensive understanding (identification) of enterprise assets mapped to the business capabilities they support, followed by a thorough risk identification and response planning effort. Our team can help you navigate the execution of developing your enterprise risk register based on a fact-based assessment, including executive-level consensus and support.

Areas of Expertise:

  • Assessment
  • risk profile
  • risk assessment
  • asset list
  • capabilities
  • mitigation
  • response
  • executive support
  • planning

Help me understand and manage risks associated with new technologies

Our world today consists of more technological disruption than we’ve seen before (Big Data, Data Lakes, the “Internet of Things” [IoT], Cloud solutions [AWS, Azure, etc.], X-as-a-service, Ransomware, etc.) which may have a profound impact to the operational facets of your business. New technology introduces new risk that must be quickly analyzed and incorporated into your risk strategy, as well as evaluation of the existing risk profile to determine any potential impact to your sensitive data. Trexin will help you understand how to stay on top of new technologies and develop processes to avoid blocking business critical initiatives as new disruptive technologies come to light.

Areas of Expertise:

  • Cloud
  • disruption
  • risk
  • AWS
  • Azure
  • Xaas
  • as a service
  • management
  • process
  • governance

Help me with interim leadership (e.g., CISO)

Recent studies indicate that less than half of all companies have a dedicated Chief Security Officer (CSO) or Chief Information Security Officer (CISO). Although there are various reasons and justifications, without dedicated focus on risk, compliance and security, you are vulnerable as an organization. Trexin can provide short and long term leadership in this space, whether it is building a new business unit within your organization, redesigning your current model, or augmenting staff with SMEs. Our experienced security experts have performed these roles in multiple organizations giving you a fast track to the target state you desire.

Areas of Expertise:

  • CSO
  • CISO
  • governance
  • InfoSec
  • information security
  • staffing
  • interim leadership

Help me protect my data

Cybersecurity should be approached from a “Defense in Depth” perspective: layering your technologies, processes, and policies – along with engaging your people and your partners – not only to protect your key assets but also to detect and react appropriately during the now inevitable security events. Trexin can help by assessing your data security in depth, and making recommendations to establish a secure environment for years to come.

Areas of Expertise:

  • Data Privacy
  • Data Security
  • Security in Motion
  • Security at Rest
  • Audit
  • Identity Access Management

4th Annual IT Hacking Conference

On October 26th Trexin’s Chief Security Officer, Glenn Kapetansky, joined a panel of colleagues including Waqas Akkawi (SIRVA Worldwide), Richard Rushing (Motorola Mobility), Erik Devine (Riverside Hospital) and moderator Tina LaCroix-Hauri (Northwestern University) at the 4th Annual IT Hacking Conference in Chicago.

Tagged in: Cybersecurity
Social Media Accounts