top of page
Welcome to The DIG™ Portal
Home
About
Contact
Contact
Use tab to navigate through the menu items.
Let's DIG into IT!
Approximately, how many applications account for 80% of the business revenue? What types of applications are these? Are these B2B, B2C or a combination of both?
How are risks relative to these applications registered? How are these risks defined (ex. Financial, Legal, Operational, Brand) and calculated? How are these risks being monitored and managed?
Where is the code and data being stored? What types of access and data controls (ex. SSO, MFA, Privileged Access, Identity Governance, Data Security, Data Tagging, Labeling, and Classification) have been deployed?
How are identities (human and machine to machine) being mapped and correlated to assets, applications, and data?
Out of these Center for Internet (CIS) Controls (a. Logging and Monitoring b. Asset Mgmt. c. Access Mgmt. d. Vulnerability Mgmt. e. Data Protection f. Configuration Mgmt.), which control(s) is/are a priority to fine tune, strengthen and/or implement?
Please briefly describe your current business environment. What is your estimated budget for your 2024 projects? How many users are in your organisation? # of subsidiaries? # of users per subsidiary? # of total desktops? # of total laptops? # of windows endpoints? # of mac endpoints? Which birthright applications are granted to new hires?
Your email address
Submit
Thank you for your time and consideration!
bottom of page