Slide 1 — Cover
degasystems
d
The information contained within this document is confidential and the property of Dega Systems. This document may not be distributed, reproduced, or copied without the written consent of Dega Systems.
1 / 15
Slide 2 — What Sets Us Apart
Help Desk
···
Centralized Services
···
Projects
···
Technology Alignment
+
CIO
Most IT Providers
degasystems
2 / 15
Slide 3 — Our Services
Help Desk:
- Remote Support
- Onsite Service
- User On/Off Boardings
- Hardware Assistance
Professional Services/Projects:
- New Office Buildout
- New Data or Email Migration
- New Security Solutions
Centralized Services:
- Monitoring
- Patch Management
- Automation
- Backup & DR
- Security
degasystems
3 / 15
Slide 4 — Technology Alignment + CIO
Most IT Providers say they do this…
Technology Alignment:
Standards Library
Compliance
Alignment Review
- - - - -
CIO:
Impact Assessment
Business impact of technology
Strategic Roadmap w/Budget
4 / 15
Slide 5 — Technology Alignment
Technology Alignment
5 / 15
Slide 6 — Our Pillars
♚
Chess board image
(upload to WordPress Media Library)
Chess board image
(upload to WordPress Media Library)
Help Desk
CIO
Centralized Services
Technology Alignment
Professional Services
6 / 15
Slide 7 — CIS IGI Assessment
CIS | IGI | Assessment
d
SUMMARY:
The overall summary report provides an overall score for each of the categories designed to show the overall health and compliance of your IT systems. Scores are weighted based on their respective importance to keeping your business in optimal range.
The overall summary report provides an overall score for each of the categories designed to show the overall health and compliance of your IT systems. Scores are weighted based on their respective importance to keeping your business in optimal range.
| Category | Score |
|---|---|
| Control 01: Inventory and Control of Enterprise Assets | 33 |
| Control 02: Inventory and Control of Software Assets | 44 |
| Control 03: Data Protection | 39 |
| Control 04: Secure Configuration of Enterprise Assets and Software | 56 |
| Control 05: Account Management | 58 |
| Control 07: Continuous Vulnerability Management | 73 |
| Control 06: Access Control Management | 67 |
| Control 08: Audit Log Management | 33 |
| Control 09: Email and Web Browser Protections | 67 |
| Control 10: Malware Defenses | 56 |
| Control 11: Data Recovery | 33 |
| Control 12: Network Infrastructure Management | 33 |
| Control 14: Security Awareness and Skills Training | 33 |
| Control 15: Service Provider Management | 100 |
| Control 17: Incident Response Management | 33 |
BASIC CYBER HYGIENE
IG1
IG2
IG3
7 / 15
Slide 8 — Category: Security
Category: Security
d
| Item | Score |
|---|---|
| DMARC, SPF, DKIM, are enabled for all email domains in use. | At Risk |
| Email encryption is available for users that need it and documentation is available on how to use. | At Risk |
| Two Factor authentication is being used for files and Email? | At Risk |
| Two factor authentication is being used for all cloud based critical systems. | At Risk |
| User accounts for former employees are closed and/or have passwords changed. | Needs Attention |
| Do all end user devices have encryption enabled. | At Risk |
| Are there users which have admin rights on their computers? | Unknown |
| Does the Wi-Fi network have radius enabled and is on its own subnet - providing an isolated subnet for guests? | Needs Attention |
| Staff are provided on-going security awareness training & testing. | At Risk |
8 / 15
Slide 9 — Technology Success Journey
I
🧩
II
🔵🔴
III
🟦🟥🟨
IV
🏠
Technology
Alignment
Alignment
→
Technology
Success
Success
→
CIO
9 / 15
Slide 10 — Dedicated Roles and Positions
Dedicated Roles and Positions
Help Desk
👤
👤
👤
👤
👤
👤
👤
👤
👤
👤
Centralized Services
👤
Projects
👤
👤
👤
👤
Technology Alignment
👤
👤
👤
👤
👤
+
CIO
👤
👤
degasystems
Your choice to Technology Success
10 / 15
Slide 11 — SOC 2 Compliance
degasystems
● Access Control
● Two-Factor Authentication
● Encryption
● Encryption
● Access Controls
● Network/Application Firewalls
SOC 2
● Two-Factor Authentication
● Network/Application Firewalls
● Intrusion Detection
● Performance Monitoring
● Disaster Recovery
● Security Incident Handling
● Quality Assurance ● Process Monitoring
11 / 15
Slide 12 — Who Are Our Clients?
Who are our Clients?
THE POPULAR CENTER FOR DEMOCRACY
NYCLU
New York Civil Liberties Union
New York Civil Liberties Union
▲ TAKEROOT JUSTICE
GREAT BOWERY
URBAN JUSTICE CENTER
OLIVER SCHOLARS
opportunity unlocked
opportunity unlocked
MOBILIZATION FOR JUSTICE
VOLS
LEGALMOMENTUM®
50 Clients
$5,300 AVG Monthly Recurring Engagement
50 Employees is the Average Size
500 Employees is Our Largest Client
12 / 15