{"id":254,"date":"2020-02-28T08:45:53","date_gmt":"2020-02-28T08:45:53","guid":{"rendered":"https:\/\/sii.ua\/?case-study=security-assessment-project"},"modified":"2020-02-28T08:45:53","modified_gmt":"2020-02-28T08:45:53","slug":"security-assessment-project","status":"publish","type":"case-study","link":"https:\/\/sii.ua\/en\/case-study\/security-assessment-project\/","title":{"rendered":"Security Assessment Project"},"content":{"rendered":"<h2>The challenge<\/h2>\n<div class=\"sii-rl-content-item-value sii-rl-businessNeed-value sii-rl-content-item-value-display\">\n<p>Substantive support of the IT Strategy team in the implementation of statutory duties.<\/p>\n<\/div>\n<h2>What we did<\/h2>\n<ul>\n<li>Verify new security technologies, methods and standards by evaluating them against business strategies and requirements<\/li>\n<li>Performing risk management activities such as vendor risk assessments, project risk analyses, vulnerability and threat analyses.<\/li>\n<li>Cooperation with service providers, IT and business units in order to identify appropriate security and control mechanisms to protect confidentiality, integrity and availability of the organization&#8217;s information resources.<\/li>\n<li>Participation in security incident management processes, including the provision of detailed analyses.<\/li>\n<li>Developing policies, procedures, guidelines and other related materials to support IT security strategies.<\/li>\n<\/ul>\n<h2>Effects<\/h2>\n<ul>\n<li>Accelerate risk assessment tasks.<\/li>\n<li>Possibility to launch further security programmed projects and involve a subject matter expert in them.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The challenge Substantive support of the IT Strategy team in the implementation of statutory duties. What we did Verify new &hellip; <a class=\"continued-btn\" href=\"https:\/\/sii.ua\/en\/case-study\/security-assessment-project\/\">Continued<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"template":"views\/single-old-case-study.blade.php","offering":[213],"industry":[1112],"client":[110],"technologies":[343],"country":[],"class_list":["post-254","case-study","type-case-study","status-publish","hentry","offering-cybersecurity","industry-retail-e-commerce","client-kamis-2","technologies-jira-2"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/sii.ua\/en\/wp-json\/wp\/v2\/case-study\/254"}],"collection":[{"href":"https:\/\/sii.ua\/en\/wp-json\/wp\/v2\/case-study"}],"about":[{"href":"https:\/\/sii.ua\/en\/wp-json\/wp\/v2\/types\/case-study"}],"author":[{"embeddable":true,"href":"https:\/\/sii.ua\/en\/wp-json\/wp\/v2\/users\/1"}],"wp:attachment":[{"href":"https:\/\/sii.ua\/en\/wp-json\/wp\/v2\/media?parent=254"}],"wp:term":[{"taxonomy":"offering","embeddable":true,"href":"https:\/\/sii.ua\/en\/wp-json\/wp\/v2\/offering?post=254"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/sii.ua\/en\/wp-json\/wp\/v2\/industry?post=254"},{"taxonomy":"client","embeddable":true,"href":"https:\/\/sii.ua\/en\/wp-json\/wp\/v2\/client?post=254"},{"taxonomy":"technologies","embeddable":true,"href":"https:\/\/sii.ua\/en\/wp-json\/wp\/v2\/technologies?post=254"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/sii.ua\/en\/wp-json\/wp\/v2\/country?post=254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}