Consulting Services

I am available on a limited basis for security consulting services. With more than thirty years of I.T. and Cyber Security experience, I can help your business navigate the difficult waters of Cyber Risk and Compliance management.

Example Engagements:

Hiring a full-time C-level professional can be cost-prohibitive. My Virtual Chief Information Security Officer (vCISO) service provides companies of all sizes and industries with executive-level guidance and leadership, but without the costs of hiring a full-time “C-suite” employee. Click here to learn more…

I have spent the past several years working as an Enterprise Security Architect. I have the experience and the certifications to ensure your organization making smart decisions around security as grow your business. Click here to learn more…

I can perform a comprehensive analysis and in-depth review of your security landscape, discovering for you where your gaps lie, and providing you with recommendations and a road map forward to better secure your environment. Click here to learn more…

I can provide oversight and guidance as your company evolves their Information Governance or Assurance, and Compliance Management programs. I can directly enhance information governance, compliance, audit response, information and records management and assurance capabilities, as well as improving stakeholder confidence, maintaining situational awareness for your management team, and organizational alignment of all the units within your company or institution. Click here to learn more…

Risk management is the identification, evaluation, and prioritization of risks (defined in ISO 31000 as the “effect of uncertainty on objectives”) followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events or to maximize the realization of opportunities. Risk management’s objective is to assure uncertainty does not deflect the endeavor from the business goals. Click here to learn more…

A data breach response plan is a course of action intended to reduce the risk of unauthorized data access and to mitigate the damage caused if a breach does occur. Here are 10 crucial steps I will follow to assist with data breach response planning: Click here to learn more…

Click Here to contact me and schedule a call to discuss your needs.