About Trustmarq
Trustmarq offers consulting and advisory services to clients across a wide industry spectrum. We are regarded as thought leaders by our clients in the domains of Privacy, Enterprise Risk, Cyber Security, and Regulatory Compliance.
With offices in Atlanta, New York, Washington DC, Dallas, and Chicago, we have the capability to deliver engagements globally.
Flagship Services
“Manage Organizational Risk by Transforming raw data into Valued and Actionable Intelligence”
Value-centric GRC platform implementation is performed with close alignment to business objectives. It is integrated within the enterprise technology platform and has realistic expectations of yield. . . . .
Learn more, or Click here to schedule a consultation
“Third Party Providers shouldn’t be the weak link in your Supply Chain”
A truly holistic TPRM goes beyond the reactive response that is typically limited to third party contract reviews, and takes a proactive approach to ensuring risk is adequately understood, communicated, and managed within acceptable thresholds.
As business increase their dependence on third parties, and customers increasingly are concerned about their provider’s risk posture. . .
Learn more, or Click here to schedule a consultation
“Key To Maximizing Your Cybersecurity Investments? Align with People and Culture First, And Don’t Always Start With Technology!”
Our Cybersecurity services take on a business-aligned and risk-driven approach to deliver maximum value for our clients’ investments. Not only do we perform the traditional benchmarking and assessment services, we apply our business knowledge and industry expertise to ensure that results delivered are relevant, actionable, and actually verified.
Learn more, or Click here to schedule a consultation
“Embracing Best Practices can transform ‘red tape’ into a ribbon cutting ceremony”
Trustmarq offers a full lifecycle of advisory and consulting services to address GDPR-driven business challenges. Regardless of which stage you’re in with your compliance initiatives, our team of seasoned privacy, risk and security practitioners can help at every step of the lifecycle
Learn more, or Click here to schedule a consultation
To view all services, click here.
-
Email Address:
Trusted Insights
PAM Azure
Our team recently presented an IAM-centric use case to a global audience of IAM practitioners. This …PAM Primer
PAM Credential Management is another term for Privileged Access Management. It’s all about managing privileged system …2020 Cybersecurity and Privacy Predictions
After countless discussions with our clients, colleagues, industry thought leaders, and most importantly, taking into account …
Business Scenario Focus
Our teams specialize in the following business scenarios:
Rapid Growth
Organizations facing significant growth and requiring rapid transformation to deal with new business challenges, while maintaining the growth factor.
Pre-IPO Alignment
We are Organizations looking to prepare for their initial public offering (IPO); aligning IT with business to maximize investment value.
Mergers & Acquisitions
Organizations that have recently gone through, or are preparing for M&A activity, requiring pre-merger due diligence, and post merger platform integration and service transformation.
Industries Served
Our team have cross-industry experience to help our clients build their business practices and processes around their specific business needs, not just industry requirements and mandates, thus attaining a thought leadership role in how business can be conducted effectively, while adhering to mandates, to maximize return on investment.
T-Mobile
CenturyLink
Cox Communications
AT&T
University of Pennsylvania Health System
Lifespan
Harvard Pilgrim Healthcare
Children’s Healthcare of Atlanta
Aetna Insurance
Travelport
Delta Airlines
Suntrust Bank
JP Morgan Chase
Experian
BNY Melon
Lockheed Martin
Southern Company
Kansas City Southern Railroad
Kansas City Power & Light
Department of Homeland Security
Success Stories
We differentiate ourselves with our vast business acumen, and deep industry knowledge. Our understanding of our clients’ business model reflects in our repeated client success stories. Scroll down to view industry-specific successes.
User Identity and Access Consolidation
Documented all enterprise-level user credential stores, validating user accounts based on HR profiles. Created a cross-store consolidation roadmap which enabled ongoing synchronization once aligned.
a
Vulnerability & Patch Management
Conducted information, architecture, & technology risk assessments, including internal and external vulnerability assessments, network and application penetration tests, and social engineering attempts to gain unauthorized access to privileged Client resources.
Cloud Services Automation
A technology services and support platform blueprint was created based on business requirements for community outreach and development, fundraising, youth empowerment, inter-faith outreach, religious programs, and social support services.
Integrated Supply Chain Risk Management
Transformed the supply chain risk management program to align with industry good practices. Improved business processes automated vendor risk assessments using the Archer GRC
Security Architecture Transformation
Created a blueprint for desired future state architecture that woud serve as the Cyber Security echo-system, protecting critical infrastructure services.
Secure SDLC Program Deployment
Facilitated integration of security good practices with the client’s software development processes. Starting with establishing business context for SSDLC program,
GRC Platform Automation
Business processes were improvised prior to automation. A unified Archer GRC platform was deployed and configured with several out-of-the-box solutions (Enterprise, Risk, Audit v5).
Risk Management Program Transformation
Established a formal risk management program based on NIST SP 800-30 and HIPAA, HITECH and Meaningful Use requirements. Creating a repeatable process for assessing and managing risks.
a
Cyber Security Program Establishment
Established an-enterprise-wide and business-aligned cyber security program based on NIST Cyber Security Framework, ISO 27001, SANS Critical Security Controls, Industry Security Specifications, and vendor specific platform protection standards.