Governance, Risk, and Compliance (GRC) Projects

A comprehensive portfolio of GRC projects I've led across various industries, demonstrating expertise in policy development, risk management, compliance, and security governance.

Tomorrow's Security, Today - Championing Audit & Compliance Excellence

Policies

Enterprise Security Policy Framework Development
2021
Global Financial Services CorporationFinancial Services6 months

Objective

Develop a comprehensive security policy framework aligned with ISO 27001, NIST CSF, and regulatory requirements to establish clear governance and compliance standards across the organization.

Methodologies

  • Gap analysis against ISO 27001 and NIST CSF requirements
  • Stakeholder interviews across business units to understand operational needs
  • Policy hierarchy development (policies, standards, procedures, guidelines)
  • Policy development workshops with key stakeholders
  • Implementation of policy management lifecycle with review and approval workflows
  • Development of policy exception management process

Outcomes

  • Created 25+ security policies covering all ISO 27001 control domains
  • Established clear roles and responsibilities for policy management and compliance
  • Implemented automated policy acknowledgment system with 95% completion rate
  • Reduced policy exceptions by 40% through improved policy design and stakeholder buy-in
  • Successfully passed external ISO 27001 audit with zero policy-related findings
  • Improved regulatory compliance posture for GDPR, PCI DSS, and local financial regulations

Frameworks

Integrated GRC Framework Implementation
2020
European Healthcare ProviderHealthcare9 months

Objective

Design and implement an integrated GRC framework to streamline compliance activities, enhance risk visibility, and improve security governance across the organization's operations in multiple countries.

Methodologies

  • Comprehensive assessment of existing governance structures and processes
  • Development of integrated control framework mapping to multiple regulations (GDPR, HIPAA, NIS2)
  • Implementation of GRC platform with customized workflows and dashboards
  • Creation of risk register and risk assessment methodology
  • Development of compliance monitoring and reporting processes
  • Establishment of governance committees and escalation paths

Outcomes

  • Reduced compliance assessment effort by 35% through control rationalization and mapping
  • Improved executive visibility into risk and compliance status through real-time dashboards
  • Established consistent risk assessment methodology across all business units
  • Reduced time to address compliance gaps by 50% through streamlined remediation workflows
  • Successfully implemented in 12 countries with localized regulatory requirements
  • Achieved 100% on-time completion of compliance activities for two consecutive quarters

Compliance Assessments

PCI DSS v4.0.1 Compliance Assessment and Remediation
2022
Multinational Retail CorporationRetail12 months

Objective

Conduct a comprehensive PCI DSS v4.0.1 compliance assessment, identify gaps, and develop a remediation roadmap to achieve compliance within a 12-month timeframe.

Methodologies

  • Detailed scoping exercise to identify all cardholder data environments
  • Gap analysis against all PCI DSS v4.0.1 requirements
  • Network segmentation testing and validation
  • Security architecture review of payment processing systems
  • Documentation review and development
  • Prioritized remediation planning based on risk and implementation complexity
  • Development of compensating controls where necessary

Outcomes

  • Identified and documented 87 compliance gaps across 12 requirement domains
  • Reduced PCI scope by 30% through improved network segmentation
  • Developed comprehensive remediation roadmap with clear ownership and timelines
  • Implemented critical security controls within 90 days to address highest-risk findings
  • Achieved compliance with all priority requirements within 6 months
  • Successfully completed ROC (Report on Compliance) with QSA validation
  • Established continuous compliance monitoring program to maintain compliance status

Baseline Implementations

Enterprise Security Baseline Implementation
2019
Manufacturing ConglomerateManufacturing10 months

Objective

Develop and implement security baselines across diverse IT environments (on-premises, cloud, OT) to establish consistent security controls and improve overall security posture.

Methodologies

  • Development of tiered security baselines aligned with CIS Controls and NIST guidelines
  • Asset classification to determine appropriate baseline requirements
  • Technical security configuration standards for all platforms (Windows, Linux, cloud, network devices)
  • Automated compliance checking implementation
  • Exception management process development
  • Phased implementation approach with pilot deployments
  • Security baseline training for IT and security teams

Outcomes

  • Established security baselines for 15+ technology platforms
  • Improved baseline compliance from 65% to 92% across all systems
  • Reduced critical vulnerabilities by 78% through consistent baseline implementation
  • Implemented automated compliance checking for 85% of infrastructure
  • Reduced security incidents related to misconfigurations by 60%
  • Created sustainable process for baseline updates and exception management
  • Successfully integrated OT security requirements into baseline framework

Risk Assessments

Enterprise Risk Assessment Program
2020
Global Insurance ProviderInsurance8 months

Objective

Establish an enterprise-wide risk assessment methodology and program to identify, assess, and manage information security and privacy risks across the organization.

Methodologies

  • Development of risk assessment methodology aligned with ISO 31000 and NIST CSF
  • Creation of risk register and risk acceptance criteria
  • Implementation of quantitative and qualitative risk analysis approaches
  • Risk assessment workshops with business units
  • Integration with enterprise risk management framework
  • Development of risk treatment planning process
  • Implementation of risk monitoring and reporting mechanisms

Outcomes

  • Conducted risk assessments for 25+ critical business processes
  • Identified and documented 150+ information security and privacy risks
  • Developed risk treatment plans for all high and critical risks
  • Reduced high and critical risks by 65% through targeted controls implementation
  • Established quarterly risk review process with executive leadership
  • Improved risk awareness across the organization through workshop participation
  • Successfully integrated information security risks into enterprise risk management program

Vulnerability Assessments

Vulnerability Management Program Enhancement
2021
Technology Services ProviderTechnology7 months

Objective

Redesign and enhance the organization's vulnerability management program to improve detection, prioritization, remediation, and reporting of security vulnerabilities across complex infrastructure.

Methodologies

  • Comprehensive assessment of existing vulnerability management processes
  • Implementation of risk-based vulnerability prioritization framework
  • Integration of multiple vulnerability data sources (scanners, threat intelligence, asset context)
  • Development of SLAs for vulnerability remediation based on risk
  • Implementation of vulnerability tracking and metrics reporting
  • Creation of exception management and risk acceptance process
  • Automation of vulnerability workflow and reporting

Outcomes

  • Reduced average time to remediate critical vulnerabilities from 45 days to 12 days
  • Improved vulnerability detection coverage from 76% to 98% of assets
  • Established clear remediation SLAs with 90%+ compliance rate
  • Implemented risk-based prioritization reducing focus on false positives by 70%
  • Created executive dashboard providing real-time visibility into vulnerability status
  • Reduced security incidents related to known vulnerabilities by 85%
  • Successfully integrated cloud and container environments into vulnerability management program

Third-Party Risk Management

Third-Party Risk Management Program Development
2022
Financial Technology CompanyFinTech9 months

Objective

Design and implement a comprehensive third-party risk management program to assess, monitor, and mitigate risks associated with vendors, suppliers, and service providers.

Methodologies

  • Development of third-party risk assessment methodology and tiering approach
  • Creation of security and privacy questionnaires aligned with industry frameworks
  • Implementation of third-party risk management platform
  • Establishment of due diligence and continuous monitoring processes
  • Development of contract security and privacy requirements
  • Creation of third-party incident response procedures
  • Integration with procurement and vendor management processes

Outcomes

  • Assessed and categorized 200+ third parties based on risk profile
  • Conducted detailed security assessments for 50+ high-risk vendors
  • Identified and remediated critical security gaps in 15 strategic vendor relationships
  • Implemented continuous monitoring for all critical third parties
  • Reduced average assessment time from 6 weeks to 2 weeks through standardized methodology
  • Established clear security and privacy requirements for all new vendor contracts
  • Successfully integrated third-party risk data into enterprise risk reporting

Incident Response & Disaster Recovery

Incident Response & Disaster Recovery Program
2021
Regional Banking InstitutionBanking8 months

Objective

Develop and implement a comprehensive incident response and disaster recovery program to improve the organization's ability to detect, respond to, and recover from security incidents and disruptions.

Methodologies

  • Development of incident response plan and playbooks for different incident types
  • Creation of disaster recovery plans for critical systems and processes
  • Implementation of incident management platform and workflows
  • Establishment of incident response team and roles
  • Conduct tabletop exercises and simulations for different scenarios
  • Development of communication templates and procedures
  • Integration with business continuity planning
  • Implementation of lessons learned process

Outcomes

  • Reduced average incident response time from 8 hours to 2 hours
  • Successfully conducted 12 tabletop exercises covering various incident scenarios
  • Improved recovery time objectives (RTOs) by 40% for critical systems
  • Established 24/7 incident response capability with clear escalation procedures
  • Developed detailed playbooks for 15 common incident types
  • Improved coordination between IT, security, legal, and communications teams
  • Successfully managed 3 actual security incidents with minimal business impact
  • Achieved regulatory compliance for incident response and disaster recovery requirements

Awareness Training

Security Awareness Training Program
2020
Global Professional Services FirmProfessional Services6 months

Objective

Design and implement a comprehensive security awareness training program to improve employee security behaviors, reduce human-related security incidents, and foster a strong security culture.

Methodologies

  • Security awareness needs assessment and baseline measurement
  • Development of role-based training curriculum
  • Creation of diverse training content (videos, interactive modules, newsletters)
  • Implementation of phishing simulation program
  • Development of security champions program
  • Establishment of metrics and measurement framework
  • Integration with onboarding and annual training requirements
  • Creation of targeted awareness campaigns for high-risk areas

Outcomes

  • Achieved 98% completion rate for mandatory security awareness training
  • Reduced susceptibility to phishing attacks from 24% to 5%
  • Decreased security incidents caused by human error by 65%
  • Established network of 50+ security champions across the organization
  • Implemented monthly awareness campaigns focusing on different security topics
  • Created specialized training for high-risk roles (executives, IT admins, developers)
  • Improved security culture score from 65 to 87 on internal assessment
  • Successfully integrated security awareness into performance evaluations

Business Impact Analysis

Business Impact Analysis & Continuity Planning
2019
Pharmaceutical ManufacturerPharmaceutical7 months

Objective

Conduct a comprehensive business impact analysis to identify critical business functions, systems, and dependencies, and develop business continuity plans to ensure resilience against disruptions.

Methodologies

  • Development of BIA methodology and assessment templates
  • Stakeholder interviews and workshops across business units
  • Identification and prioritization of critical business functions
  • Determination of recovery time objectives (RTOs) and recovery point objectives (RPOs)
  • Mapping of dependencies between business functions, systems, and third parties
  • Development of business continuity strategies and plans
  • Creation of crisis management and communication procedures
  • Testing and validation of continuity plans through tabletop exercises

Outcomes

  • Identified and documented 35 critical business functions across the organization
  • Established clear RTOs and RPOs for all critical systems and processes
  • Developed detailed continuity plans for all critical business functions
  • Identified and addressed single points of failure in critical processes
  • Conducted 8 tabletop exercises to validate continuity plans
  • Improved recovery capabilities for manufacturing systems by implementing redundant controls
  • Reduced potential business impact from disruptions by an estimated 60%
  • Successfully integrated business continuity planning with disaster recovery and incident response