The United States Department of Defense has mplemented the Cybersecurity Maturity Model Certification (CMMC) framework to normalize and standardize cybersecurity preparedness across the federal government’s defense industrial base (DIB). The primary goal of the certification is to improve the surety and security of Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) that is in the possession and use of their federal contractors.
A breach of the GDPR requirements can results in fines and mandates that can significantly impact your ability to operate your business and additional fines, compliance mandate, etc. If your business is collecting and/or storing data from citizens or residents in Europe, you will be affected by the provisions of GDPR. Complying to GDPR takes more than adding a banner to your website making visitors aware of cookies from your website.
Health Information Trust Alliance (HITRUST) CSF is a certifiable framework, designed to provide organizations who work with health data with a comprehensive & streamlined approach to regulatory compliance, privacy & risk management. Thus, the HITRUST CSF aids in safeguarding electronic protected health information (ePHI) & other critical information and helps organizations streamline their security and compliance requirements. It also provides standards and auditable controls that include compliance frameworks such as HIPAA, SOC 2, GDPR, CCPA, PCI DSS, ISO 27001, and NIST CSF among others.
The healthcare industry is being targeted by hackers because Electronic Health Records (EHR) are very valuable on the black market. Over 1.6 million people had their information stolen and the estimated cost of these data breaches have cost the healthcare sector more than $6.2 billion dollars. Understandably, patients and Healthcare and HealthTech companies are increasingly anxious about the security of their health data.
ISO 27001 is a popular & well-accepted security standard & certification to implement & showcase an organization’s security posture. The objective of the standard is to “provide requirements for establishing, implementing, maintaining and continuously improving an Information Security Management System (ISMS)”. The independent certification to the standard is recognised around the world as an indication that your organization is aligned with information security best practices.
NIST Cybersecurity Framework is a voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity-related risk. The main purpose of NIST CSF is “Improving Critical Infrastructure Cybersecurity”
Accorian is a Payment Card Industry Approved Scanning Vendor or, PCI ASV. The ASV Program Guide (v3.0) defines an ASV as a “company qualified by PCI SSC for ASV Program to conduct external vulnerability scanning services in line with PCI DSS Requirement.” The ASV validation lab established by PCI SSC tests an ASV’s scanning solution before designating a vendor as a PCI SCC approved scanning vendor.
A SOC 2, or “System and Organization Controls 2” is quickly becoming one of the most sought-after compliance standards in North America. The SOC 2 framework is an auditing procedure that ensures your service providers securely manage the data to protect the interests of your organization and client’s privacy on five principles – Security, Availability, Processing integrity, Confidentiality and Privacy.
Accorian is a Payment Card Industry Approved Scanning Vendor or, PCI ASV. The ASV Program Guide (v3.0) defines an ASV as a “company qualified by PCI SSC for ASV Program to conduct external vulnerability scanning services in line with PCI DSS Requirement.” The ASV validation lab established by PCI SSC tests an ASV’s scanning solution before designating a vendor as a PCI SCC approved scanning vendor.
The number of organizations migrating their technology to the cloud has been increasing rapidly. Over 96% businesses are either completely or, partially on the cloud. Hence, it is critical for organizations to develop a strategy for securing their cloud presence. Cloud Security is the practice of securing data, applications, and underlying infrastructure including policies, controls, configurations etc. Most Cloud Service Providers (CSPs) attempt to create a ready to use secure cloud work environment for customers.
When a suspected breach occurs are you prepared? Having an incident response plan for different types of threats -whether it’s a ransomware incident, insider threats, or an external data breach, is paramount. We can help with all aspects of incident response and management.
A penetration test (pen-test) is a simulated cyber-attack on an IT system. Like your annual physical, an annual penetration test is a vital part of ensuring your enterprise security is up-to-date. With the rate of cyber threat & vulnerabilities increasing every year in the last decade, a penetration test is necessary to ensure you detect vulnerabilities present in your technology landscape before a hacker exploits it.
This includes private citizens, government, law enforcement agencies, healthcare systems or other critical infrastructure entities. Ransomware is malicious software that hackers deploy on a computer to prevent users from accessing their computer or network until a ransom is paid. It can be spread through phishing emails or unknowingly clicking on on an infected website.
A Security Risk Assessment enables organizations to identify, assess & prioritize their risks across people, process & technology, and validate if the current controls are adequate to safeguard against security threats.
The need for cybersecurity has changed significantly over the last few years. With a mixture of well-funded, sophisticated attackers leveraging AI and script-kiddies using simple techniques like ransomware, we must ensure that our internal, IP, and client data are all secured.
The U.S. Congressional Small Business Committee found that 71% of cyber-attacks happened to small businesses. Hackers target smaller companies because they often lack the resources, expertise and, budget to devote to cybersecurity.
Chief information Security Officers (CISOs) or Head of Information Security are highly sought after, to the point individuals with the right professional experience are both scarce and expensive. For many small & mid-sized organizations finding the right balance between maturity, security, and expense can be challenging. With the development of cybercrime, the new application-age, and a consistently changing landscape, a vCISO may be the answer to your needs. Accorian’s vCISO can give your organization decades of experience and maturity with the power of a full-scale team of SMEs behind them, essentially becoming your cybersecurity and compliance partner for a fraction of a full-time CISO.
6,Alvin Ct, East Brunswick, NJ 08816 USA
Toronto
Ground Floor,11, Brigade Terraces, Cambridge Rd, Halasuru, Udani Layout, Bengaluru, Karnataka 560008, India
Role Summary:
As a wordpress developer, you would be responsible for the development, maintenance, and optimization of our company’s website. This role requires a strong understanding of web development technologies, content management systems, and a keen eye for design and user experience. You will play a crucial role in enhancing our online presence and ensuring a seamless user experience for our audience.
Mandatory Skill Sets/Expertise:
Key Attributes:
Key Responsibilities:
Role Summary
The senior manager is responsible for leading and sustaining the team that drives the compliance strategy by working collaboratively with internal teams, SMEs, external customers, vendors, auditors and other stakeholders. He/she should be able to work collaboratively with other departments and stakeholders to achieve company-wide goals and satisfy the client.
Mandatory Skill Sets/Expertise
Key Attributes
Key Responsibilities
Role Summary:
The Sr. Security Consultant / Team Leader is responsible for leading a team of Security Consultants, managing team and professional development goals, ensuring on-time delivery of GRC projects, and providing expert guidance to team members on GRC-related matters.
Mandatory Skill Sets/Expertise
Key Attributes:
Key Responsibilities:
Role Summary
Accorian is actively seeking for a dynamic and seasoned Consultant/Senior Consultant specializing in
the Governance, Risk, and Compliance (GRC) domain to join our team. The preferred candidate will
assume a pivotal role in providing strategic guidance to clients regarding the implementation of sound
risk management practices overseeing vendor relationships, conducting audits across various
frameworks, and harnessing the capabilities of the GRC tool. This multifaceted position necessitates a
profound comprehension of GRC principles, regulatory compliance, and the ability to implement
resilient risk management strategies. Collaborate extensively with cross-functional teams, conduct
evaluations of organizational processes, and deliver strategic recommendations aimed at enhancing
GRC frameworks.
Mandatory Skill Sets/Expertise
1. Bachelor’s or master’s degree in computer science, Information Security, Risk Management,
Cyberlaw, or a related field.
2. Proficient in leading GRC frameworks and methodologies (SOC, ISO 27001, HIPPA, NIST, PCI DSS,
etc.).
3. Strong understanding of cybersecurity frameworks and principles (e.g., NIST Cybersecurity
Framework, ISO 27001, HIPAA).
4. Familiarity with audit processes, internal controls, and assurance methodologies.
5. Experience with GRC software solutions (e.g. SAP GRC, ACL, Archer, etc.).
6. Knowledge of risk assessment, control design, and reporting methodologies
7. Ability to work independently and as part of a team.
Preferred Certifications: CISSP, ISO 27001 Lead Auditor or Implementer.
Key Attributes:
a. 1 – 3 years of experience in consulting or industry roles related to GRC.
b. Proven track record of successful GRC program implementation and optimization.
c. Customer-centric mindset with a focus on understanding and addressing clients’ unique needs.
d. Ability to translate complex technical concepts into clear and actionable insights for clients.
e. Passion for staying up to date on the latest trends and developments in GRC.
f. Strong work ethic and a commitment to delivering high-quality results.
g. Add on Strong project management skills to successfully lead and execute projects.
Key Responsibilities:
1. Assessing cybersecurity risks and vulnerabilities and partnering with the security team to identify
and analyze potential threats, evaluating their impact and likelihood of occurrence.
2. Developing and implementing GRC strategies to analyze industry regulations and standards
relevant to cybersecurity, translating them into practical policies and procedures for our
organization.
3. Conducting GRC audits and collaborating and performing regular evaluations of our security
controls and compliance measures, identifying gaps, and recommending improvements.
4. Collaborating with strategic-integration and fostering strong relationships across various
departments (IT, security, legal, compliance) to ensure seamless integration of GRC processes and
cybersecurity initiatives.
5. Provide expert advice on GRC strategies, frameworks, and methodologies to clients.
6. Collaborate with internal and external auditors, providing necessary documentation and support
for audits.
7. Ensure clients’ adherence to relevant regulations, standards, and industry-specific compliance
requirements.
8. Developing and delivering training programs to educate employees on cybersecurity best
practices and compliance requirements, promoting a culture of security awareness.
9. Staying informed on emerging threats and regulations and continuously update your knowledge
on the evolving cybersecurity landscape and adapt your strategies accordingly
Role Summary
The role of the Project Manager would be to help plan and track cybersecurity & technology projects to meet KRAs, milestones & deadlines. This would also include coordinating. meetings with clients & internal teams and resource planning. The primary KRA would be to ensure projects are delivered on a timely manner and all stakeholders. are updated about the latest status of the project.
Mandatory Skill Sets/Expertise
Key Attributes
Key Responsibilities: –
Role Summary:
As the Lead Software Architect, you will be a key leader in the development and evolution of our B2B SaaS product & it’s associated systems. The entire development team will report to you.
Drawing upon your extensive technical expertise and industry knowledge, you will design and implement scalable, robust, and efficient software solutions. Collaboration with cross-functional teams, technical leadership, and staying abreast of emerging technologies will be essential for success in this role.
About Our Product:
GORICO was incepted by security practitioners & audits with decades of experience to simplify the security conundrum and streamline the security compliance and security maintenance process. Security is a growth enabler today as it’s table stakes for doing business and a mandatory requirement as part of the third-party risk strategy of clients.
This is a single solution tailored to an organization to manage all your security adherence, compliance, vendor risk, vulnerability management , policy & procedure management and risk assessment needs.
It enables behaviour change and shift in the mindset towards security. It’s the only way to address the current reactive approach to it. Hence, going from a once a year or, couple of times a year audit rush to year long sustenance of security.
Hence, GORICO empowers organizations to understand, attain and sustain true security.
Mandatory Skill Sets/Expertise
Key Attributes
Key Responsibilities
Role Summary:
As an IT Engineer, you will play a pivotal role in providing technical support to our internal members and ensuring the smooth operation of our IT environment. You will work under the guidance of IT Manager to resolve technical issues, help end-users, and contribute to the overall success of our IT support team
Mandatory Skill Sets/Expertise
Key Responsibilities
Role Summary
As a developer, you will be responsible for designing, coding, testing, modifying and implementing new features in the B2B SaaS product. You would closely work with the technical architect towards building a scalable GRC tool.
Mandatory Skill Sets/Expertise
Key Attributes
Key Responsibilities
Role Summary
As a Content Strategist & Editor, you would be responsible for strategizing and creating high quality, engaging and informative content including blog spots, articles, product/service descriptions and other forms of digital and print media. You would be responsible for enhancing the brand awareness of Accorian whereby contributing towards lead generation from prospective customers.
Mandatory Skill Sets/Expertise
Key Responsibilities
Drop your CVs to joinourteam@accorian.com
Interested Position