Information Security Assessments

Tailored Information Security Assessments, Comprehensive Results
Whether your organization is just beginning to develop an information security program or if you have a mature program that you’re looking to enhance, an information security assessment from the FireOak team can help your organization develop, supercharge, or fine-tune your program.
Our team of experts conducts information security assessments that combine the best of traditional vulnerability assessments with elements of penetration tests to reveal a holistic view of an organization’s security posture.
Traditional vulnerability assessments provide clients with a long list of potential vulnerabilities, but don’t typically include illustrative examples of how these vulnerabilities can be combined by an attacker to allow access to an organization’s confidential information, data, and systems.
On the other hand, traditional penetration tests will provide this level of detail, but only document the vulnerabilities uncovered during the test, ignoring many other potential gaps, weaknesses, and vulnerabilities within an organization’s governance, controls, and security operations. Penetration tests can be valuable, but only when an organization has already identified and addressed all known vulnerabilities.
An assessment designed to fit your organizational needs
Methodology
Through the engagement, we will conduct:
- A thorough, hands-on technical assessment from a security perspective of the on-premises and cloud environments
- In-person interviews with key stakeholders to understand security operations, practices, and processes
- A review of current policies, procedures, and information/data governance framework
For Business Leaders & IT
From a technical perspective, these assessments include details on all of the vulnerabilities present in a network, along with clear examples of how these vulnerabilities can be exploited in the current environment. Business leaders appreciate the clear explanations of how systems can be exploited and what the risks are to their organization. IT leaders appreciate the comprehensive technical details included in findings.
Information Security Assessments: The FireOak Difference
1
Actionable
Our reports are chock-full of practical, actionable next steps. Your team will know what to do.
2
Prioritized
At the end of the report, we’ll include a high-level step of next steps, in priority order.
3
Comprehensive
In addition to the written report, we’ll include the output from all of our technical evaluations.
4
Business Oriented
The report will include an executive summary designed for organizational leaders.
5
Q&A with Execs
We’re available to talk with senior executives, board members, or your full leadership team.
6
Knowledge Transfer
As part of our wrap-up, we’ll debrief with your tech team and will answer their questions.
The FireOak Acorn for Security Assessments
We use the FireOak Acorn in all of our information security assessments. Our team of experts works with your IT staff to install Acorns across your organization’s global on-prem environment. Acorn devices are small and easy to transport, making them ideal for remote and overseas deployments.
Using these devices allows us comprehensive visibility into an organization’s entire network without the high costs and time that can be associated with extensive travel or maintaining an on-site presence.

Recent Articles
News and insight from the FireOak team about managing, securing, and sharing knowledge
-
What We’re Reading – January 28, 2019
We keep an eye out and share the most interesting articles, reports, and case studies FireOak topics: managing, sharing, and securing information, data, and knowledge.
-
Government Shutdown Causing Open Data Confusion
While absent TSA agents and food inspectors might be more of a concern to the general public, the loss of access to public data is proving disruptive for those who rely on access to open data to do their jobs.
-
10 Steps to Prep for CCPA
The California Consumer Privacy Act (CCPA) of 2018, which takes effect on January 1, 2020, is intended to protect the personal data of consumers who reside in California.
-
Knowledge Management: Findability vs. Discoverability
One of the top symptoms we encounter when diagnosing knowledge management problems is hearing “I can’t find what I’m looking for” or “I have to troll around in shared folders to learn about stuff.” Both of these statements are indicators of findability and discoverability challenges.
-
Forward Momentum in U.S. Open Government Data
Right before the end of the year, on December 21, 2018 the U.S. Congress passed The Open, Public, Electronic, and Necessary Government Act (also known as the OPEN Government Data Act), an act designed to break down information silos in the federal government, transforming inaccessible documents into open and usable data.
-
Six Months with the GDPR
Europe’s General Data Protection Regulation (GDPR) just passed its six month milestone. Not surprisingly, most organizations aren’t yet in compliance, but one key takeaway is that good-faith efforts towards compliance are worth investing in.
-
Big Data in Agriculture: Research Data Loss Horror Stories
We’ll be presenting at the CGIAR Big Data in Agriculture Convention on October 2, 2018. Abby Clobridge and Eric Smith will be sharing three research data loss horror stories from an information security perspective — situations that led to entirely preventable data loss.
-
KMWorld 2018
FireOak Strategies, LLC is pleased to be a Platinum Sponsor of this year’s KMWorld event. We’ll be at the conference in Washington, D.C. from November 6-8, and we’ll be presenting at the co-located Office 365 Symposium.
-
Is it time to ‘spin down’ some of your virtual machines?
There’s no question, VMs are fantastic. But like anything that is cheap and easy, they have a tendency to persist long past their usefulness. Why invest the time and energy to retire a VM?
-
Job Posting: Part-Time Metadata Specialist (Contractor)
FireOak Strategies, LLC, a boutique consulting firm specializing in Knowledge Management, Information Management, and Information Security, is looking to add a Metadata Specialist to our network of contractors.
-
Job Posting: Knowledge Management and Taxonomy Specialist (Contractor)
FireOak Strategies, LLC, a boutique consulting firm specializing in Knowledge Management, Information Management, and Information Security, is looking for a Knowledge Management (KM) and taxonomy specialist.
-
Multi-Factor Authentication
When implemented properly, multi-factor authentication dramatically strengthens security defenses, making it much more difficult for attackers to use stolen credentials.