Eye on Security

CISO Partner

Have you established a safe computing environment? No enterprise network is free from threats, whether external or from within. The network includes servers, computers for staff, devices (within your network), software prevalent within your enterprise, access controls, and physical access to your enterprise.

The best posture comes from a strong defense: 1) have visibility of your network, 2) users are trained for cybersecurity awareness, 3) know what’s coming at you, 4) know when something happens, 5) who/what it happened to, 6) isolate/remediate, 7) recover and install countermeasures, 8) monitor for repeat offenders. Experience, academics, maturity, an ITIL framework, and keeping organized, delivers reliable enterprise security performance.

Block threats from exiting, permeating through, or re-entering your network; respond as quickly as the severity of the threat dictates with an incident response plan that includes the resources you have to contain the problem promptly; track threat incidents to your enterprise with a database to identify trends and respond better to repeat attacks.

CISO Partner Services

Down Arrow

Information Security (IS) IS Program Consulting MSSP
External/Internal Monitoring Off-site SOC GPO Access Controls
IAM/PAM Consulting Vulnerability Management Threat Intelligence Mgt
Endpoint defense Email Defense DLP for DBMS & users
Patch Strategy/Testing/Rollout Government compliance Application Security

  5 Pillars Information Security Governance
1. Governance Assess how IS governance policies protect enterprise
2. Risk Mgt & Compliance Risk Assessment, Security Audit, Risk Posture, Outline to shore-up gaps
3. Architecture & Implementation IS Program Architecture (e.g. policies, procedures, appliances, GPO, end-point assurance)
4. Program Mgt & Development Manage IS program, sharpen performance by maturing competencies, capabilities, delivery
5. Incident Response & Business Continuity Mgt Policies enforced, testing, procedures and activities adhered to; metrics track actions to maintain / improve

CISO Partner offers consulting, project management and staff augmentation services to organizations and hospitality providers that operate within the tri-state region (beginning at 25 nodes, from Philadelphia to Stamford) and for select projects across the continental US; expect depth-of-bench expertise from CISO Partner through our referral partners.  (Serving for-profit business, finance, retail, private education, and healthcare verticals.) The minimum project is a 4 month contract (from 25 nodes), is scalable for project scope and size, and includes:

  • Assess your security status, present a strategic and tactical plan to execute from within 15 days of project start;
  • Provide an interactive cloud-based IT ticketing system to track incidents, alerts and run management reports
  • Execute plans from 90 days of project start;
  • Prepare a handoff to your staff or arrange a management agreement with us, completed within 15 days of project close.

Contact me today for a free 45 minute consultation in your office. Click Request a Consultation, at the base of this page, enter CISO Partner in subject line, fill in your email signature in message body, send.  I reply within 24 hours to schedule the consultation.


Consulting advice via reports, 1x fee

Appliance Sales with install oversight

SECaaS; Subscriptions to SECurity as a Service

Project creation, implementation and support for arranged fee

Versed with:

UTM – Unified Threat Management, Trustwave SWG McAfee UTM MalwareBytes, Eset UTM
Endpoint defense: Bromium or InvinceaX Software firewall BlueCoat K9 Browser
NIDS, NIPS / HIPS, Cisco IronPort Sandbox behavior detection Signature detection
Identity Access Management (IAM) + Priv Acct Mgt IBM Proventia NIDS / NIPS SIEM, Symantec MSS, FireEye, AlienVault, InsightIDR
Defend mobile devices with Mobile Device Management (MDM) Triumfant IoC service Patch Management
Lumension & Patchlink Vulnerability Scans / PCI Compliance Assessor/ Scans; Qualys, NexPose Protect your Credit/Debit Cards with SignalVault

(Affiliate Partner)

Referral Agent: Local information security management from NYC based PerimeterWatch. Global: Simnet, ConvergeOne; AlienVault (small -mid-tier), versed with Rapid7 (mid-tier to large-cap)
Business Partners:

eiq-logo-horiz-small (1)  Trustwave_logo_RGB_150dpi