SDI Logo
Services
Industries
About SDI
Resources
IT Managed Services
Government
About Us
Blogs
Advisory & Consulting
Utilities
Locations
News
ServiceNow
Aviation
Leadership
Videos
Enterprise Data & AI
Transportation
History
White Papers
Enterprise Asset Management
Public Safety
Careers
Case Studies
Public Safety
Commercial Real Estate
Culture
Banking, Financial Services & Insurance
Diverse Partnerships
ArchiveLink
Xchange
Manufacturing
End-User Services & Support
Infrastructure Services

Search request

Search
Contact Us
Back to blog
Home
•
Blogs
•
Your Cybersecurity Audit: The Day After
April 2, 2018
8 min

Your Cybersecurity Audit: The Day After

Share article:
X - TWITTER
LINKEDIN
FACEBOOK
On this page:
Heading

You have received your Cybersecurity Audit final report.  Vulnerabilities are identified, gaps in processes are revealed, organizational misalignment is exposed.  What to do next?

Establish executive sponsorship

The first and most important step is to establish active executive sponsorship and assign overall responsibility to a senior manager.

It is the executive management’s responsibility to establish risk management fundamentals within the organization. This includes a business framework for setting security objectives and aligning strategic risk management with business needs as well as external statutory and regulatory compliance drivers. Without active sponsorship by executive management and a specific role dedicated to ensuring the fulfillment of security goals, instituting security controls is next to impossible.

A senior manager must have clear responsibility and authority to drive planning, enforce compliance with defined policies, and approve all exceptions to the security policy.

Prioritize remediation strategies

The most important part of the risk management process is to triage the severity of the risk according to its impact and likelihood. It is also important to understand how effective your existing security controls were in managing these risks. This should be a quick exercise to determine your first areas of focus and its urgency.

Mitigate risks

We can think of security risks as belonging to one of three main categories: People/Policy, Process and Technology. We would begin with process since it is likely that weak or missing processes allowed for the security risks in the first place.

Process
Process is where we often see the greatest opportunity for improvement especially within the Configuration and Maintenance processes. Are your basic maintenance activities adequate? Are these processes run often enough? How do you verify that the process was run completely and effectively? Some of these processes may include:

  • Ensuring that all ports and services not required for normal and emergency operations are disabled.
  • Tracking, evaluating, testing, and installing applicable cyber security patches for all cyber assets.
  • Testing after the installation of security patches, cumulative service packs, and version upgrades (which are all considered significant changes).
  • Using antivirus and malicious software prevention tools, where technically feasible.
  • Defining and enforcing restrictions on who can perform maintenance and repair, emergency procedures, and remote configuration and maintenance.
  • System log collection and alerting
  • Comprehensive Change Management procedures
  • Lifecycle Management

Technology
In some cases, a process may not be effective due to lack of resources or the nature of the business. Technology can mitigate these risks.  Some examples are: electronic asset management, system log management, network hardening, VPN restrictions or email filtering for SPAM/Phishing. At a higher-level, Intrusion Prevention Systems or Next Generation Firewalls are included.

People and Policy
Taking input from the Process and Technology risk categories, People and Policy risk mitigation and often the slowest and most difficult to implement. Policies must remain dynamic as new risks, technologies and procedures emerge. Included in this risk category are: security awareness training, access privilege and access revocation policies, incident handling, Change Management policies and ongoing management and monitoring policies.   Something to keep in mind…your Cybersecurity audit is already out of date on day one.

A cyber security program must be comprehensive—it is only as strong as its weakest link in the cycle of continuous monitoring, detection and response.

To learn more about our cybersecurity services, contact SDI.

About SDI Guest Blogger: Tim Portokalis

Tim Portokalis has over 25 years of experience in Infrastructure solutions, including designing and managing large-scale network implementations, network management, and cloud-based solutions.

‍

Read more

Latest Insights from SDI

Discover more insights

Stay connected with SDI Presence.

Receive our latest resources, press releases, and stay up-to-date on the latest news.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Blogs
•
April 1, 2026
The Future of Maintenance: Integrating Preventive and Predictive EAM in 2026 
News
•
March 31, 2026
SDI Presence Appoints LaDarius Jackson as Vice President of ServiceNow Delivery
Blogs
•
March 24, 2026
From Data Lake to Data Swamp: Why Bad Data Poisons Every Decision 
News
•
March 18, 2026
SDI Presence Joins Western Regional Innovation & Technology Alliance (WRITA)
Blogs
•
March 3, 2026
Running ServiceNow Where Failure Isn’t an Option
News
•
February 3, 2026
SDI Presence names George J. Sperekas II Account Executive for Illinois SLED market 
Blogs
•
February 3, 2026
Escaping the IT Upside Down: How to Stop Tech Chaos Before It Takes Over
Blogs
•
February 3, 2026
ServiceNow SKO 2026 Takeaways: Delivering Ambition at AI Speed 
Blogs
•
February 3, 2026
From AI Pilots to Production: The Critical Role of Governance-as-a-Service
Blogs
•
December 18, 2025
2025 in Review: A Year of Presence, Progress, and Purpose
Blogs
•
December 18, 2025
Why AI Projects Fail and How Governance-as-a-Service Fixes It 
Blogs
•
December 18, 2025
Don’t Let IT Be the Grinch: How Managed Services Keep Business Running Through the Holidays
News
•
December 18, 2025
SDI Presence Appoints Andrew Venincasa to Lead ServiceNow Sales
Blogs
•
November 25, 2025
ServiceNow 2025 Year in Review: A Year of AI Momentum and Platform Expansion 
News
•
November 7, 2025
SDI Presence Celebrates Eighth Consecutive Year on the Chicago Tribune’s Top Workplaces List
Discover more insights

Ready to transform your IT operations?

Contact to learn how our IT Managed Services can benefit your organization
Work With Us
Footer Background Image
Stay Connected with SDI.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

We'd love to hear from you! Please fill out the form and we'll get back to you as soon as possible.


[Placeholder text - Hubspot will create the error message]
[Placeholder text - HubSpot will replace this with form submitting text]
Thanks for submitting the form.
Services
IT Managed Services
Advisory & Consulting
ServiceNow
Enterprise Data & AI
Enterprise Asset Management
Public Safety
Xchange
Industries
Government
Utilities
Aviation
Transportation
Public Safety
Commercial Real Estate
Banking, Financial Services 

& Insurance
Manufacturing
About SDI
About Us
Locations
Leadership
History
Careers
Diverse Partnerships
Resources
Blogs
News
Videos
White Papers
Case Studies
X - TWITTER
INSTAGRAM
LINKEDIN
FACEBOOK
© 2026 SDI All rights reserved
Terms of Service
Privacy Policy
Website by Foursets with love