Reply To: IT/Cyber Due Diligence

#38709
Luka Mladinov
Participant

I am working for an IT consulting company. This is what we usually do in terms of IT DD.

Define IT applications and systems owners for relevant business functions
Create inventory of IT applications and systems
Document hardware inventory
Document infrastructure landscape:
– Computing platforms (mainframe hardware, server hardware, operating systems, etc.)
– Data storage and hosting (data center facility, disaster recovery, etc.)
– End-user computing (client hardware, client operating system, etc.)
– Collaboration tools (e-mail, handheld devices, office automation, etc.)
– IT security (audit tools, authentication, directory services, encryption, virus protection, etc.)
– Systems management (configuration / asset / change management, service/help desk, etc.)
– Telecommunications (firewall, wireless, voice, data, etc.)
– Identify business critical applications and infrastructure components

Are you sure you
want to log out?

Request a Brochure

Request a Brochure

Contact us to discuss your goals and needs!

Contact us to discuss your goals and needs!

Book a Demo

Book a Demo

Contact us to discuss your goals and needs!

Contact us to discuss your goals and needs!