Reply To: IT/Cyber Due Diligence


Luka Mladinov

I am working for an IT consulting company. This is what we usually do in terms of IT DD.

Define IT applications and systems owners for relevant business functions
Create inventory of IT applications and systems
Document hardware inventory
Document infrastructure landscape:
– Computing platforms (mainframe hardware, server hardware, operating systems, etc.)
– Data storage and hosting (data center facility, disaster recovery, etc.)
– End-user computing (client hardware, client operating system, etc.)
– Collaboration tools (e-mail, handheld devices, office automation, etc.)
– IT security (audit tools, authentication, directory services, encryption, virus protection, etc.)
– Systems management (configuration / asset / change management, service/help desk, etc.)
– Telecommunications (firewall, wireless, voice, data, etc.)
– Identify business critical applications and infrastructure components

Loading.. Please wait