Navigant's Cyber Risk and Information Security PracticeLearn More

About Us

Our Approach

Our Approach

COMPASS’ approach to cyber security is derived from 10+ years of experience advising our clients on the approach that makes the most sense for their organization. While technology is an important component of an organization’s security infrastructure, there are many other areas that make up the cyber security ecosystem.


COMPASS has categorized these many components of cyber security into the three pillars of cyber security: people, policies, and technology. These three pillars work in concert to construct the best defense against intentional or unintentional loss of data.


The human element of cyber security is often the most difficult for organizations to control. Organizations can spend millions of dollars to secure their technical infrastructure, but one employee could compromise the network with a simple click of a malicious link. COMPASS guides organizations through the process of reducing these risks by assessing their employees’ overall awareness of cyber security best practices and training them on ways to better protect their organization’s data.


Policies and procedures are the backbone of every organization. They serve as a guide for your employees and outline how information is to be exchanged, stored, and secured. Without comprehensive policies and procedures, employees are left to guess how to respond in various scenarios, which can often leave data exposed. COMPASS assists organizations in assessing their current documentation and developing policies where needed to ensure that our clients are properly protecting their data.


Technology is a vital component of an organization’s cyber security approach, and it should be an enabler and a protector of assets. From traditional technology such as firewall filters and network segmentation, to emerging technologies, there are a variety of technical ways to reduce the risk and impact of a breach. COMPASS’ information security analysts and engineers are experts in assessing and remediating network vulnerabilities to build a strong network infrastructure.

Work With Us Learn How