CISO Partner

Have you established a safe computing environment? No enterprise network is free from threats, whether external or from within. The network includes servers, computers for staff, devices (within your network), software prevalent within your enterprise, access controls, and physical access to your enterprise.

The best posture comes from a strong defense: 1) have visibility of your network, 2) users are trained for cybersecurity awareness, 3) know what’s coming at you, 4) know when something happens, 5) who/what it happened to, 6) isolate/remediate, 7) recover and install countermeasures, 8) monitor for repeat offenders. Experience, academics, maturity, an ITIL framework, and keeping organized, delivers reliable enterprise security performance.

Block threats from exiting, permeating through, or re-entering your network; respond as quickly as the severity of the threat dictates with an incident response plan that includes the resources you have to contain the problem promptly; track threat incidents to your enterprise with a database to identify trends and respond better to repeat attacks.

5 Pillars Information Security Governance 1. Governance 2. Risk Mgt & Compliance
3. Architecture & Implementation 4. Program Mgt & Development 5. Incident Response & Business Continuity Mgt

CISO Partner offers consulting, project management and staff augmentation services to organizations that operate within the tri-state region (beginning at 25 nodes, from Philadelphia to Stamford) and for select projects across the continental US; expect depth-of-bench expertise from CISO Partner through our referral partners.  (Serving for-profit business, finance, retail, private education, and healthcare verticals.) The minimum project is a 4 month contract (from 25 nodes), is scalable for project scope and size, and includes:

  • Assess your security status, present a strategic and tactical plan to execute from within 15 days of project start;
  • Provide an interactive cloud-based IT ticketing system to track incidents, alerts and run management reports
  • Execute plans from 90 days of project start;
  • Prepare a handoff to your staff or arrange a management agreement with us, completed within 15 days of project close.

Contact me today for a free 45 minute consultation in your office. Click Request a Consultation, at the base of this page, enter CISO Partner in subject line, fill in your email signature in message body, send.  I reply within 24 hours to schedule the consultation.

 

Consulting advice via reports, 1x fee

Appliance Sales with install oversight

SECaaS; Subscriptions to SECurity as a Service

Project creation, implementation and support for arranged fee

Versed with:

UTM – Unified Threat Management, Trustwave SWG McAfee UTM MalwareBytes, Eset UTM
Endpoint defense: Bromium or InvinceaX Software firewall BlueCoat K9 Browser
NIDS, NIPS / HIPS, Cisco IronPort Sandbox behavior detection Signature detection
Identity Access Management (IAM) + Priv Acct Mgt IBM Proventia NIDS / NIPS SIEM, IBM QRadar, FireEye
Defend mobile devices with Mobile Device Management (MDM) Triumfant IoC service Patch Management
Lumension & Patchlink Vulnerability Scans / PCI Compliance Assessor/ Scans; Qualys Protect your Credit/Debit Cards with SignalVault

(Affiliate Partner)

Referral Agent: Cybersecurity management from NYC based PerimeterWatch.  National: ConvergeOne; AlientVault USM (SOC-in-a-box); GSS Infotech; CyberArk
Business Partners:

eiq-logo-horiz-small (1)  CS Logo_img_pkLogo-DSWTrustwave_logo_RGB_150dpi

Advertisements