Protected: Templar Shield completes groundbreaking project for a large electric utility to enable OT Asset Awareness & Vulnerability Management with Enterprise Governance
There is no excerpt because this is a protected post.
Overview
Fortune 500 bank partnered with us to implement Archer’s Enterprise Risk Management application to automate and centralize their risk management activities.
Requirements/Challenges
The client used Archer to complete document their enterprise policies, standard and controls. They also completed the CIA assessment against applications and completed their control attestation using Archer’s core and on-demand applications. The leadership team engaged Templar Shield to update their GRC program to be more Risk based. This involved, updating all their current processes, and adding new use-cases to complete the enterprise risk assessments – both top-down and bottom-up.
Over a course of 6 months, our team worked on updating the existing Policy Management, Control Assurance and Exceptions process to meet the new process requirements. New Archer ERM use-cases were implemented and customized to meet the client’s process requirements. This effort required a detailed and thorough gap-analysis and requirements mapping to ensure all the applications were interfaced correctly and access control worked seamlessly across the platform ensuring no one had access over and above what was authorized. We also worked with business process leads to ensure that end user adoption and deployment of the new system was completed seamlessly across the global organization.
Overall, the business teams realized a lot of time savings owing to the automations put in place using a gamut of tools such as APIs, Data Feeds, macro-enabled data import templates and seamless integrations with other Archer applications. End-users were trained in using the new functionality and key business unit stakeholders were trained to create advanced reports to meet their day-to-day needs – making them self-sufficient which led to successful program adoption across the enterprise.
There is no excerpt because this is a protected post.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |