Our Proven Approach

Chief Information Security Officer (CISO) advisory services help businesses develop, mature, and manage cybersecurity programs that guard sensitive information, strengthen brand reputation, and differentiate products.

Partnering with BARR gives you access to a team of skilled security professionals that serve as a virtual CISO (vCISO), helping you build and maintain a program that is flexible and adaptive to the needs of its stakeholders. Our proven approach includes three phases designed to build and optimize a customized cybersecurity program that caters to your business needs.

How It Works

https://www.barradvisory.com/wp-content/themes/salient/css/fonts/svg/basic_sheet_txt .svg

Phase 1: Gap Assessment

We believe in determining the why before proposing the how, and that careful planning and thorough identification of gaps are imperative to achieve your security objectives.

https://www.barradvisory.com/wp-content/themes/salient/css/fonts/svg/arrows_circle_check.svg

Phase 2: Remediation

We provide a roadmap to successful remediation, turning what were gaps in your security program into competitive advantages.

https://www.barradvisory.com/wp-content/themes/salient/css/fonts/svg/arrows_clockwise_dashed.svg

Phase 3: Continuous Management

With the continuous support of a virtual CISO, you gain a valuable strategic asset. We weave security and compliance into the DNA of your organization, differentiating you among your competition.

Not only do we give you the tools you need for a successful cybersecurity program, we help you execute. Explore our services available to you as part of Phase 3: Continuous Management:

Risk Assessment

BARR offers a comprehensive risk assessment service that is designed to identify, quantify, and manage security risk. A thorough risk assessment can help you identify where you need to shore up your security controls to mitigate internal and external risk factors.

Policy & Procedure Documentation

Any successful security program will include a set of policies and procedures. We’ll provide consultation resulting in a customized set of policies and procedures that are both understood and followed by all members of your organization.

Security Project Management

Project management is essential to the successful execution of any cybersecurity program. Why? Because without it, cybersecurity projects are left ill-defined, underfunded, and past due. The BARR Advisory team helps you manage scope, schedule, and cost of cybersecurity initiatives.

Security Questionnaire Responses

When your customers send security questionnaires, you want to be ready with responses that will put them at ease knowing their data is safe with you. BARR formulates those responses and offers direct communication with your customers to help resolve any concerns they may have, leaving them feeling confident in choosing your product or service.

Internal Audit Service

Our team of experienced consultants work with your unique business needs to develop or enhance your internal audit function; identifying shortcomings in your internal controls, testing those controls, and providing actionable next steps. We perform audits against frameworks including SOC 2, NIST CSF, ISO 27001, CIS Top 20, and more.

Vendor Assessment

How can you hire third-party vendors and minimize the worry that they may not live up to your own security standards? We help you pinpoint the vendors that present the highest level of risk using a standardized, risk-based approach. Once identified, we offer simple steps to protect you from potential risks associated with using third party services.

Mappings to Other Frameworks—Test Once, Use Many

BARR Advisory team will assist you in identifying systems and controls within your security program, and will map those controls to multiple standards including SOC 2, ISO 27001, NIST CSF, CSA STAR, HITRUST, NYDFS, the 18 CIS Controls, and more.

Virtual CISO Support

BARR Advisory offers ongoing support as a virtual CISO, providing transparency on your cybersecurity program to your board, executive team, and other stakeholders. We are your strategic asset to weave security and compliance into the DNA of your organization and differentiate among your competition.

Benefits of a Virtual CISO

  • Significant reduction in cost compared to a full-time CISO
  • An independent perspective eliminates conflict of interest
  • Limited turnover means continuity for your business
  • Industry expertise necessary to make sound security decisions
  • Services are flexible and scalable on short notice
  • Readily available resources at your disposal

Case Studies and Resources

Save Yourself Time By Using Salient

Handling how you manage payments online is very important. Salient is a new innovative and easy to use method of sending & receiving money online. It’s fast, secure and free to sign up.

  • Top Customer Support
  • Most Liked Company
  • Best In Class 2016
  • Friendliest Group
  • Innovative Brand

cyBARR Chats: HITRUST Edition FAQ Part 6

| HITRUST, Security, Videos | No Comments
In this episode of cyBARR Chats HITRUST Edition, we discuss the difference between HIPAA and HITRUST with BARR's HITRUST Manager Swathi West. Transcript [00:00:00] Christine Falk: Hi everyone. And welcome...

Why Healthcare Hacking Is Profitable and How You Can Prevent It

| Data Privacy, Healthcare Security, HITRUST, Vulnerability Management | No Comments

Not long ago, hackers focused on stealing financial data. The digitization of financial transactions brought heavy regulation and security to protect those transactions, but thieves still found ways to steal…

Understanding Microsoft’s SSPA Program and the DPR

| Compliance Updates, Data Privacy, Security | No Comments

Millions of companies around the globe rely on Microsoft products for their business processes. Over 1.3 billion devices run Windows 10, and Office365 is one of the most widely used…

cyBARR Chats: Simplifying the Zero Trust Model: A Panel Discussion

| Cloud Computing, Data Privacy, Security, Videos | No Comments
In this episode of cyBARR Chats, we speak with BARR Advisory Founder and President, Brad Thies, and Hive Systems CEO and Co-Founder, Alex Nette, about simplifying the Zero Trust Model,...

Contact Us for a Free Consultation

We’re here to help you! Speak with a BARR specialist about your security and compliance needs.