Gap Analysis, Preparation, and Remediation Services
New Program Development, Pre-Assessment Reviews and Remediation Services for:
-
CCPA
-
CDPA
-
CIS
-
CMMC
-
COBIT
-
COPPA
-
CPA
-
CPRA
-
DFARS
-
FedRAMP
-
FERPA
-
FFIEC
-
FTC Safeguards
-
FISMA
-
GDPR
-
GLBA
-
HIPAA
-
HITRUST
-
ISO
-
ITAR
-
NIST
-
NYDFS
-
OFAC
-
PCI-DSS
-
PIA
-
PIPL
-
SOC
Implementation & Remediation of Frameworks
-
COSO
-
NIST CSF
-
Executive Order 14028, NIST
-
ITIL
Security Software, Hardware Guidance, and Professional Services Consulting
-
Asset Management
-
BIA, BCP, DRP, IRP
-
Cisco, Palo Alto, Arista, Aruba, Fortinet and more
-
Cloud Integration /Migrations
-
Data Protection & Lifecycle Management (governance)
-
EDR / MDR
-
IAM
-
Email Migrations
-
NAC
-
Network Segmentation / Micro Segmentation
-
MFA (tool agnostic)
-
PAM
-
Patch Management
-
Penetration / Vulnerability Testing
-
Security Program Assessments / Gap Analysis
-
SIEM / AI / ML
-
Software Inventory Rationalization
-
Tabletop Sessions IR, BCP, and more
-
Virtual CISO and CIO
-
WAF
-
ZeroTrust
Proactive Maintenance & Compliance as a Service
(CaaS)
​This service enables clients to obtain continuous improvements while ensuring they do not fall out of compliance after all their hard work to obtain their HITRUST, PCI, and other certifications.
​
CaaS ensures that continuous monitoring of change, configuration management, and new implementations do not void and null your certification status. We partner with your team and leverage your existing ITSM investment to provide advice and recommendations to change orders so that risks are not introduced unintentionally, and your certifications are not at risk.
​
Contact us and ask more about this service offering.
AI Security Planning, LLMs, and Governance Controls
AI planning, security provisioning, access controls, new or customized your large language models, and governance.
Managed Services
Managed services for IT systems, HelpDesk, AI continuous maturity and management, Information Security, Vendor Risk Management or customize your solution to exactly what you need.
Third-Party Risk Management as a Service
Contact us to learn more about our Third-Party Risk Management as a Service, offering.
Virtual C-Level Services
Our virtual C-level services can be customized to meet your specific needs. We also assist clients in transitioning to full-time C-level services when they are ready.
Merger & Acquisition Integrations
Review risks, and create proactive plans to integrate people, processes, and technologies. This includes healthcare systems (EPIC and others), billing systems, ERP, GRC, SaaS platforms, cloud providers, data security, organizational alignment, skills assessments, and more.
Business Process Optimization (BPO)
Our principal consultants will analyze your current business processes, workflows, software systems used, data flows, and more. We provide root cause analysis for inefficiencies, risks, and challenges identified. Recommendations are provided with a Six Sigma influence to streamline your operations, workflows, and to improve efficiencies.
Positive and measurable results are found with process-related cost savings, improved customer service, simplicity in workflows, customer support efforts, and updated documentation (Policies, Process, and Procedures). Ask for references to see how Core Insights has streamlined processes for businesses saving them between thousands and up to $9.5 million.
CCI - Cyber Counterintelligence
We provide integrated CCI and engineering support to our clients for both reactive and proactive models. Some of these services include but are not limited to:
​
-
Identify, investigate, and analyze cyber events of significance;
-
Develop tools for applying standard cyber security and analysis practices. We use the client’s existing tools or can recommend solutions if there are gaps.
-
Analyze classified and unclassified networks to identify security vulnerabilities and intrusion detection parameters.
-
We act as liaisons and work cyber counterintelligence investigations with interagency partners (FBI, DoD, CIA, NSA, and others)
-
Report changes, trends, and implications of evolving cyber issues
-
Provide proactive threat-hunting
-
Provide integrated cyber-investigative, strategic planning, operational plans, and technical engineering support.
-
Analyze classified and unclassified networks to identify security vulnerabilities and intrusion detection parameters;
-
Track and document route cause analysis findings and trace the source of the threat
-
Identify high risk, potential threat exposures before they occur and ensure proper proactive measures are in place.
-
Establish misdirection farms for bad actors and steer them away from your business and confidential systems/data.
-
Dark web proactive investigations and new threat vector hunting based on dark web findings.​
​
Cyber Counterintelligence Government Sector and Military
Core Insights provides CCI services leveraging various security investigative models and tools along with CYBERINT, OSINT, SIGNIT and HUMANIT for Military and other government agencies. Contact us for more information.
ERP Systems
Selecting the right ERP System is critical in supporting business growth, ensuring operational efficiency, and addressing unique needs and concerns, including integration with legacy systems and IT security considerations.
To select the best ERP solution the following must be considered:
-
Scalability
-
Integration
-
Usability
-
Functionality
-
Maintenance
-
Flexibility
-
Security
-
Adaptability
CIPMC DIVISION
CORE INSIGHTS PRIVATE MILITARY CONTRACTORS
Our family of partner companies has grown to include a global team of industry leaders, including Constellis, Triple Canopy, Olive Group, and The Development Initiative, as well as legacy companies such as Centerra, ACADEMI, AMK9, OMNIPLEX, Strategic Social, and Edinburgh International.
Today, combined with our partners, we are the largest and most diverse non-financial risk management company in the United States. We offer turnkey solutions to address our customers’ most complex challenges wherever we are needed worldwide.