Exciting news! Thirdera has been acquired by Cognizant.

Contact Us
Jaison Man of color with formal suit and glasses 2022-12-1 Jaison Man of color with formal suit and glasses 2022-12-1

Policy & Compliance

Protect your organization from violations and security threats with repeatable compliance workflows.

Blueprint Overview

3 WEEKS
arrow

Initiate & Plan

5 WEEKS
arrow

Execute

2 WEEKS
arrow

Deliver

2 WEEKS
arrow

Go-Live & Beyond

Initiate & Plan

3 WEEKS
arrow

Demo Policy & Compliance, collect requirements and deliver stories for acceptance.

8 HRS Product Owner
9 HRS Scrum Master
32 HRS Development Team
6 HRS Customer Stakeholders
6 HRS Acceptance Testers
Weekly hours by role

Execute

5 WEEKS
arrow

Configure Policy & Compliance as per best practice and customer requirements; continually show progress back to the customer and collect new requirements.

4 HRS Product Owner
8 HRS Scrum Master
48 HRS Development Team
3 HRS Customer Stakeholders
2 HRS Acceptance Testers
Weekly hours by role

Deliver

2 WEEKS
arrow

Provide functional and technical knowledge transfer and support customer acceptance testers.

12 HRS Product Owner
13 HRS Scrum Master
50 HRS Development Team
10 HRS Customer Stakeholders
16 HRS Acceptance Testers
Weekly hours by role

Go-Live & Beyond

2 WEEKS
arrow

Promote code to production and provide Hyper-Care.

4 HRS Product Owner
8 HRS Scrum Master
22 HRS Development Team
3 HRS Customer Stakeholders
2 HRS Acceptance Testers
Weekly hours by role

Thirdera Staffing

role icon

Engagement Manager

Responsible for providing leadership and direction to achieve growth and transformation.

role icon

Technical Lead

Analyzes business requirements and provides system design while implementing system solutions.

role icon

Functional Lead

Ensures the smooth functioning of technical operations, monitors and evaluates staff progress, and ensures overall client satisfaction.

James arms folded glasses purple-2 James arms folded glasses purple-2

Project Scope

Thirdera's Policy & Compliance Blueprint includes a robust list of deliverables to set your Risk program on course for long-term success. Guided by proven best practices, our team of advisory and technical experts configures and implements a solution best fit for your unique needs while establishing a foundation of knowledge to promote ongoing maturation. Key deliverables include:

  • Load core data including authority documents, policies, and control objectives from UCF or based on customer-provided data
  • Configure policy lifecycle including ownership, policy acknowledgment campaigns, and policy exception workflow and notifications
  • Define control attestation and indicator
    templates and cadence
  • Configure control lifecycle and ownership
  • Set entity types and generate entities, associate control objectives to generate controls
  • Configure process for issue creation, issue life cycle and remediation of issues
  • Configure notifications, reports, and dashboards from templates
  • Activation of Compliance Management Workspace
  • Provide Functional Overview, Technical Knowledge Transfer, and UAT Support

Outcomes

 

Seamless Workflows

Workflows to manage the change and approval of polices and controls over time
Icon-Approval

Distinct Roles

Clear ownership of policies, controls, and entities
Icon-Approval

Searchable Policy Library

Single searchable policy library with ability to track user acknowledgement
Icon-Approval

Consolidated View

Complete view into compliance by entity, policy, and framework
Icon-Approval

Automated Attestation

Automated attestation and continuous compliance mechanisms on defined cadence
Icon-Approval

Measurable Processes

Defined and reportable policy exception and issue remediation processes
Icon-Approval

Simple Non-Compliance Management

Automated generation of issues on control non-compliance
Icon-Approval

Dashboards & Reporting

Dedicated dashboards and reporting to increase visibility and simplify program management

Let's get started

 

Connect with our Security & Risk experts for a detailed look at what an assessment would look like at your organization and how to improve your cyber resilience and Policy & Compliance processes. 

 

Get in touch