top of page
Welcome to The DIG™ Portal
Home
About
Contact
Contact
Use tab to navigate through the menu items.
Let's DIG into IT!
Approximately, how many applications account for 80% of the business revenue?
How are risks defined (ex. Financial, Legal, Operational, Brand) and calculated?
How are these risks currently being monitored and remedied?
Where is the code and data being stored and what types of access controls (ex. SSO, MFA, Privileged Access, Identity Governance) have been deployed?
How are applications and data being mapped and correlated to identities?
Out of these CIS Basic Controls (a. Logging and Monitoring b. Asset Mgmt. c. Access Mgmt. d. Vulnerability Mgmt. e. Configuration Mgmt.), which control(s) needs improvement?
Please briefly describe a top of mind use case or a high-risk constraint.
Your email address
Submit
Thanks for sharing! We're always striving to improve.
bottom of page