top of page

Solutions
Consulting. 

Red River is a leader in the delivery of Consulting services in the Ottawa area. We strive to respond to our clients' needs promptly and collaboratively - we simplify the staffing process to produce perfect partnerships.

Consulting

Consulting

At Red River, we believe that long term relationships built on trust and solid business ethics are the blueprint for providing the best possible value and service to our clients. We strive to offer our clients the latest in IT technology and services. Our mission is to create and maintain standards of excellence in our industry, business relations, achievements, and expertise; this results in a high level of satisfaction for all of our clients.

Red River Labs is our industrial research and development activity—advancing the discipline of cyber security by attacking and solving the hard problems of the field. It performs cutting-edge research in cyber security, develops new Solutions or technologies and product prototypes, invents new tools for our customers, and focuses our relationship with research universities.   We are proud to work with our strategic partners, who share our dedication to delivering the technical expertise and experience to successfully implement information technology and security solutions.

We have worked with the Government of Canada Standards, ITSG 33 - IT Security Risk Management, the Harmonized Threat and Risk Assessment (HTRA) methodology, and the Cyber Secure Canada program; and international standards and frameworks such as ISO 27001, ISO 27005, SANs, DoD CMMC/NIST SP800-171, and NIST 800-53. 

 

Red River brings together resources with experience in all domains of information technology management including:

  • IT security strategic planning

  • Project Management

  • Stakeholder Engagement

  • Risk Management

  • Operational Management

  • IT Security Implementation Management

  • Policy Development

  • Business Requirements Analysis

  • Functional Specifications Development & Requirements Management

  • Design, System Development & Implementation

  • Privacy Impact Assessments

  • Statement of Sensitivities

  • Security Audits

  • Threat & Risk Assessments  

bottom of page