Consulting Services

I am available on a limited basis for security consulting services. With more than thirty years of I.T. and Cyber Security experience, I can help your business navigate the difficult waters of Cyber Risk and Compliance management.

Example Engagements:

  • Virtual CISO Services

    Hiring a full-time C-level professional can be cost-prohibitive. My Virtual Chief Information Security Officer (vCISO) service provides companies of all sizes and industries with executive-level guidance and leadership, but without the costs of hiring a full-time “C-suite” employee. Click here to learn more…
  • Virtual Security Architect

    I have spent the past several years working as an Enterprise Security Architect. I have the experience and the certifications to ensure that your organization is making smart decisions around security as you grow your business. Click here to learn more…
  • Compliance and Audit Response

    I can provide oversight and guidance as your company evolves their Information Governance or Assurance, and Compliance Management programs. I can directly enhance information governance, compliance, audit response, information and records management and assurance capabilities, as well as improving stakeholder confidence, maintaining situational awareness for your management team, and organizational alignment of all the units within your company or institution. Click here to learn more…
  • Threat Management and Risk Mitigation

    Risk management is the identification, evaluation, and prioritization of risks (defined in ISO 31000 as the “effect of uncertainty on objectives”) followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events or to maximize the realization of opportunities. Risk management’s objective is to assure uncertainty does not deflect the endeavor from the business goals. Click here to learn more…
  • Breach Response Management

    A data breach response plan is a course of action intended to reduce the risk of unauthorized data access and to mitigate the damage caused if a breach does occur. Here are 10 crucial steps I will follow to assist with data breach response planning: Click here to learn more…
  • SOC 2 Type II Audit Reviews

    You need to ensure your sensitive data is secure. Often compliance with regulations or international law requires you to demand a SOC 2 Type II report. Making sense of a SOC 2 report however requires a specialized set of skills and experience. I can provide a full review and recommendations so you can focus on the mission of your business: Click here to learn more…

 

Click Here to contact me and schedule a call to discuss your needs.