Self-Configuring Control Framework
ITG intelligent Cybersecurity Framework Architect automatically scopes an organization’s program — mapping threats, risks, controls and regulations — via a step-by-step guided assessment. The system self-configures an annual review schedule complete with pre-built content, workflow triggers, notifications and reminders. Based on this schedule, ITG CPM manages program activities throughout the year — using hands-free automation to alert stakeholders at appropriate times to make sure tasks are completed and evidence is captured.
Automated Workflows & Assessments
Automated workflows and assessments keep cybersecurity program activities moving forward on time throughout the year. The predefined schedule triggers the distribution of assessments and reviews to assigned stakeholders, tracks completion status, and sends reminders when tasks are running late.
ITG CPM automates:
- Threat Reviews
- Risk Evaluations
- Control Reviews
- Policy Reviews
- Change Reviews
- Incident Reviews
- Training Program Validation
- Issue Remediation
- Facility Assessments
- Application Assessments
- System Assessments
- Baseline Assessments
Dynamic Reporting & Dashboards
Powerful reporting gives the CISO real-time visibility into their cybersecurity program. Interactive dashboards offer immediate insight into the status of threats, risks, policies, controls, issues and incidents — with the ability to drill down into details as needed.
Preconfigured, out-of-the-box reports include:
- Threat History & Trending
- Risk Remediation Status
- Policy Control Coverage
- Controls Effectiveness
- Top third Parties at Risk
- Current Cyber Review Requests
- Risk Prioritized Projects
- Top High-Value Assets at Risk
- Organization Training Coverage
- Due diligence requests
- Issues Summary Status
- Major Incidents Status
Custom reporting lets the CISO create tailored reports for the C-suite, risk committee, the board of directors and other key stakeholders. Plus, with the click of a button, the CISO can export a customized, board-ready report on the state of the entire cybersecurity program that covers all relevant risks, threats, control reviews, assets, issues, incidents, projects and policies.