{"id":18366,"date":"2022-04-28T19:52:36","date_gmt":"2022-04-29T00:52:36","guid":{"rendered":"https:\/\/www.riscco.com\/caricom\/information-security\/"},"modified":"2025-06-16T19:48:22","modified_gmt":"2025-06-17T00:48:22","slug":"information-security","status":"publish","type":"page","link":"https:\/\/riscco.com\/en\/services\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"18366\" class=\"elementor elementor-18366 elementor-18362\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a62fb0 e-flex e-con-boxed e-con e-parent\" data-id=\"5a62fb0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a2053fc e-con-full e-flex e-con e-child\" data-id=\"a2053fc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6485d93 elementor-widget elementor-widget-heading\" data-id=\"6485d93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Information Security<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4b16488 e-flex e-con-boxed e-con e-parent\" data-id=\"4b16488\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9138533 e-con-full e-flex e-con e-child\" data-id=\"9138533\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c0632a3 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c0632a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28f124f elementor-widget elementor-widget-heading\" data-id=\"28f124f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-large\">RISCCO can help you establish your information security policy<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-963ed6f elementor-widget elementor-widget-text-editor\" data-id=\"963ed6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>RISCCO performs gap assessments against various information security frameworks, regulatory frameworks, good practices or against its information security strategy, aligned with its risk map, with business strategies and to establish controls considering the risks and threats organizations are facing. Among the frameworks are: ISO27001:2015; NIST; COBIT; SANS 20 Security Control; HITRUST; PCI-DSS; HIPAA; GDPR.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-70523d9 e-con-full e-flex e-con e-child\" data-id=\"70523d9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0984f1d elementor-widget elementor-widget-image\" data-id=\"0984f1d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:34}},&quot;motion_fx_scale_effect&quot;:&quot;yes&quot;,&quot;motion_fx_scale_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:2,&quot;sizes&quot;:[]},&quot;motion_fx_scale_range&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:2.3,&quot;sizes&quot;:[]},&quot;motion_fx_scale_direction&quot;:&quot;out-in&quot;,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/riscco.com\/wp-content\/uploads\/2021\/09\/Seguridad_Informacion_489564012_xl-2015-scaled.jpeg\" class=\"attachment-full size-full wp-image-17645\" alt=\"\" srcset=\"https:\/\/riscco.com\/wp-content\/uploads\/2021\/09\/Seguridad_Informacion_489564012_xl-2015-scaled.jpeg 2560w, https:\/\/riscco.com\/wp-content\/uploads\/2021\/09\/Seguridad_Informacion_489564012_xl-2015-scaled-300x200.jpeg 300w, https:\/\/riscco.com\/wp-content\/uploads\/2021\/09\/Seguridad_Informacion_489564012_xl-2015-scaled-1024x683.jpeg 1024w, https:\/\/riscco.com\/wp-content\/uploads\/2021\/09\/Seguridad_Informacion_489564012_xl-2015-scaled-768x512.jpeg 768w, https:\/\/riscco.com\/wp-content\/uploads\/2021\/09\/Seguridad_Informacion_489564012_xl-2015-scaled-1536x1024.jpeg 1536w, https:\/\/riscco.com\/wp-content\/uploads\/2021\/09\/Seguridad_Informacion_489564012_xl-2015-scaled-2048x1366.jpeg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-edc33d2 e-flex e-con-boxed e-con e-parent\" data-id=\"edc33d2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a0e8c68 e-con-full e-flex e-con e-child\" data-id=\"a0e8c68\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cd3df70 elementor-widget elementor-widget-heading\" data-id=\"cd3df70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">INFORMATION SECURITY<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f053fe elementor-widget elementor-widget-heading\" data-id=\"9f053fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-large\">BENEFITS\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d005630 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d005630\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5ee8b82 e-con-full e-flex e-con e-child\" data-id=\"5ee8b82\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-22565b5 e-con-full e-flex e-con e-child\" data-id=\"22565b5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c0e9997 elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"c0e9997\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">DIAGNOSTICS<\/h3><p class=\"elementor-image-box-description\">We carry out diagnoses on the effectiveness of the information security strategy (IS). <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b05d90a elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"b05d90a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">WE EVALUATE<\/h3><p class=\"elementor-image-box-description\">We perform vulnerability tests on web-type applications, internal and external networks. <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1cf38ed elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"1cf38ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">WE PRODUCE<\/h3><p class=\"elementor-image-box-description\">We evaluate the security of applications. <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b1fcae3 e-con-full e-flex e-con e-child\" data-id=\"b1fcae3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e58be89 elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"e58be89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">WE BUILD<\/h3><p class=\"elementor-image-box-description\">We build and implement IS policies, processes and procedures, based on international standards. <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c158c32 elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"c158c32\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">WE ACT<\/h3><p class=\"elementor-image-box-description\">We review compliance with local or international regulations on IS. <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Information Security RISCCO can help you establish your information security policy RISCCO performs gap assessments against various information security frameworks, regulatory frameworks, good practices or against its information security strategy, aligned with its risk map, with business strategies and to establish controls considering the risks and threats organizations are facing. Among the frameworks are: ISO27001:2015; [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":17999,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-18366","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/riscco.com\/en\/wp-json\/wp\/v2\/pages\/18366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/riscco.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/riscco.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/riscco.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/riscco.com\/en\/wp-json\/wp\/v2\/comments?post=18366"}],"version-history":[{"count":3,"href":"https:\/\/riscco.com\/en\/wp-json\/wp\/v2\/pages\/18366\/revisions"}],"predecessor-version":[{"id":29434,"href":"https:\/\/riscco.com\/en\/wp-json\/wp\/v2\/pages\/18366\/revisions\/29434"}],"up":[{"embeddable":true,"href":"https:\/\/riscco.com\/en\/wp-json\/wp\/v2\/pages\/17999"}],"wp:attachment":[{"href":"https:\/\/riscco.com\/en\/wp-json\/wp\/v2\/media?parent=18366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}