Loading...
IT Security Best Practices
Menu24 experts in IT Security Best Practices topic
-
KWKhürt WilliamsInformation Security Architect at Monkey Hill, LLC • Princeton, NJPrincipal Information Security Architect with 20+ years of cybersecurity domain experience in threat modeling and the design of architectures and information security controls. Ability to communicate with a broad audience from management to junior staff, both the technically aware and the technology-averse alike.IT Security Best Practices • Information Security • Cloud Security • Amazon Web Services • Solution Architecture • Information Security Management • CISSP • Internet Security • ITIL v3 Foundations Certified •$2/min per minute5.0 1 12
-
RSRadu StanescuSenior Information Security Consultant • Bucharest, BrusselsSenior Information Security Consultant for several Govermental Institutions. Cybersecurity Entrepreneur. Cybersecurity MentorIT Security Best Practices • Information Security • Computer Security • Network Security • Information Security Management • Security Management • Internet Security •$3.33/min per minute5.0 1 1
-
CCClarence ChristieProject management professional • PennsylvaniaFounder of Jean Consulting Group. Expert in human performance, value stream, and operational efficiency. Data analytics and resource optimization to save time and capitalIT Security Best Practices • Business Development • Social Media Marketing • Management Consulting • Creative Problem Solving • Training & Development • Enterprise Architecture • Enterprise Risk Management • Human Capital Management • Value Stream Mapping •$1.67/min per minute— — 0
-
KSKamil StasiukiewiczCybersecurity Researcher and Ethical Hacker • Vaud, SwitzerlandGrowth Cybersecurity Researcher and Ethical Hacker, CTF player, blue and red team specialistIT Security Best Practices • Hacking • Networking • Computer Security • Network Security • Social Engineering •$1/min per minute— — 0
-
IMIsha MujumdarCyber Security Entrepreneur and Enthusiast • IndiaManaging Director at Vigilante Cyber Forces. CISA | CEH | CHFI | CND MS in Cybersecurity Aim to simplify cybersecurity services and thus make them reach to each individual and organization.IT Security Best Practices • Hacking • Information Security • Computer Security • Network Security • Information Security Management • Security Audits • Penetration Testing • Internet Security •$1/min per minute— — 0
-
JGJosh GiesingOperations Manager at Computer PRO Unltd. • St. LouisJosh Giesing is the Operations Manager at Computer PRO Unltd in St. Charles, Missouri. Since 2008 he has been working on IT consulting project ranging from network infrastructure setup to deploying VOIP phones. He has experience designing and coding websites but, his main focus is on proactive management of computers, networks, and security. Josh lives in Portage Des Sioux, Missouri and as a hobby study’s other languages.IT Security Best Practices • Email Marketing • Cloud Computing • Computer Security • Computer Hardware • IT Service Management • Computer Repair • Computers •$1.67/min per minute— — 0
-
SSShahid SharifIT Professional • Toronto, ON, CanadaIT professional with over 22 years of experience in various industries. CISSP, CISA, CRISC, PCIP, PMPIT Security Best Practices • Disaster Recovery • IT Strategy • Auditing • Data Privacy • Enterprise Architecture • PCI DSS • CISSP • CISA • Business Continuity Planning •$2.50/min per minute— — 0
-
CJC. Joel ParsonsCybersecurity Consultant and Career Coach • Washington D.C.Founder of Origen Security; Offensive Security & Cybersecurity Career Coach & Mentor; Red Team Builder; Red Team Trainer; Technical Mentor; Cyberwarfare SMEIT Security Best Practices • Technology • Information Technology • Consulting • Information Security • Computer Security • Security • Network Security • Information Security Management • Security Audits •$3.33/min per minute— — 0
-
SLSam LodhiPractical & Business Aligned Cyber Security Expert • London, UKLondon Entrepeneur. CEO/Managing Director of I.B.R.S Group, Founder of Kerberus Cyber Security. Investor and board member on 20 businesses. Trustee of Lodhi Foundation - giving back to make the world a better place.IT Security Best Practices • Information Security • Cloud Security • Computer Security • Security • Network Security • Information Security Management • Security Audits • Security Management • Internet Security •$16.67/min per minute— — 0
-
ASAdam SculthorpeEntrepreneurAdam has over 19 years of experience in the security and technology industry, including consulting for many Fortune-500 companies. He protected over US$350 billion in daily banking transactions for top Swiss and U.S. investment banks and has extensive security intelligence experience. Throughout his career, Adam has developed a range of security intelligence solutions for clients in various industries, including Police, Government, Military, Financial and Corporate. His solutions protect businesses and communication infrastructure from data centers to global military satellite systems, safeguarding troops and their families. Adam's expertise has been recognized globally, and he has been interviewed by various media outlets such as television, radio, and worldwide press. He has discussed topics ranging from online banking threats to cyber wars and has been featured in The New York Times, The Register, and Gadling, among others. Media: TV Interview with Kevin O’Leary Radio Shalom – Threats to online banking customers The New Scientist – Software bots could menace Google ads The Register – Botnets strangle Google Adwords campaigns New York Times – Web Marketers Fearful of Fraud in Pay-per-click (client) Gadling – Destination tool promises increased travel safety Radio Shalom – Cyberwars “The New Frontier”IT Security Best Practices • Entrepreneurship • Marketing Strategy • Technology Management • Technical Marketing • Amazon Web Services (AWS) • Security • Information Security Management • Strategic Thinking • Security Management •$16.67/min per minute— 2 5
-
JCJared CooperbandCISM, CISSP-ISSMP, CISSM, CISSO, CSLO, CCISO, EISM • TorontoCybersecurityl leader, consultant, advisor. Virtual CISO. Vulnerability Management, Threat Intelligence, Security Operations, Endpoint Protection, Data Loss Prevention.IT Security Best Practices • Information Security • Computer Security • Network Security • Vulnerability Assessment • Information Security Management • Security Management • Vulnerability Management • Threat & Vulnerability Management • Internet Security •$1/min per minute— — 0
-
HBHarshit BhatnagarCyber Security Expert • BengaluruI am a cyber security professional with 6 years of hands-on experience in ethical hacking, red team, cyber security consulting. I am currently working with Airbus as a full time cyber security Architect.IT Security Best Practices • Information Security • Cloud Security • Computer Security • Network Security • Information Security Management • Security Audits • Internet Security • Teaching English •$3.33/min per minute— — 0
-
MBMartyn BoothExperienced Chief Information Security Officer • LondonI'm an experienced information security professional, currently running security for a large global data business based in the UK. I have experience in information security, risk and privacy. I sit on the board of two large charities, provide mentoring services to junior security leaders and provide investment advice to incubators and investors in security technologies.IT Security Best Practices • Information Technology • Information Security • Cloud Security • Computer Security • Network Security • Information Security Management • Security Audits • Security Management • Internet Security •$2/min per minute— — 0
-
AMAseem MukhiSecurity culture specialist • new delhiOne of the most overlooked attributes for defining success of a digital transformation project is the journey that our people need to make to be equipped to handle change. I help organizations understand what it takes to create a secure and resilient team, thereby helping create a sustainable organization. Aseem has nearly 14 years of core experience in leading transformational projects related with cybersecurity, IT security assessments, privacy, policy and strategy development amongst other. He has led and managed several projects involving review of IT processes and development of target operating models. He has delivered several large scale engagements and has helped clients conceptualize, design, and build security systems to realize business benefits.IT Security Best Practices • Information Technology • Information Security • Cloud Security • Computer Security • Security Audits • Internet Security • Cyberlaw •$2.50/min per minute— — 0
-
MKMorris Kananura (IT consultant/ Uganda Tourism Expert)IT Consultant/Uganda Tourism Expert • Kampala, UgandaICT expert and consultant, with focus on Security, keen interest and knowledge on emerging threats and remedies that come up with new technology advancements, former ICT expert in Government of Uganda with experience in implementing various sophisticated projects including the National Security Information System for the country. Project Management Professional, Red Team analysis and Penetration TestingIT Security Best Practices • Cloud Computing • Enterprise Software • IT Management • IT Strategy • Software Project Management • Agile Project Management • IT Governance • Penetration Testing • Requirement Specifications •$1.67/min per minute— — 0
-
JIJulie IT Security6 years in IT security, 19 years in IT • Europe for 6 months then North AmericaI have expertise in IT Security and can perform penetration testing, IT forensics and recommendations on how to protect you or your company against hackers. I can also help you to learn programming or hacking skills.IT Security Best Practices • Hacking • Cooking • Programming •$1/min per minute— — 0
-
RWryan wilsonProfessional Sr. Penetration Tester/Ethical HackerHey everyone, My name is Ryan and I am a professional professional penetration tester (aka Ethical hacker). Im currently the Infrastructure Security Tech Lead in my role as well. I have been testing for a number of years now. I have a variety of experience in infrasture (internal & external), web application (internal, api, breakout, etc), physical intrusion, OSINT, Networking and much more. Im actually a product of Mentor Cruise. Some time ago now someone from there helped me from the ground up and I was able to eventually land my first job in cyber security. There was an article from MentorCruise about this which you can find here - https://mentorcruise.com/blog/professional-basketball-cybersecurity/. Just a quick background on myself. I graduated from William Penn University with a bachelors degree in Information Technology. I then went on to play professional basketball for 8 years all over the world. Once retired I found out about ethical hacking and thats when I started reading, taking courses and using bitdegree. At some point I started applying for jobs and landed one and havent looked back since. I understand the grind and hard work it takes to come from nothing to make a way into ethical hacking. I think thats what sets me apart from alot of other institutions I can relate to starting later and knowing which route is best for those starting from scratch just as I did. My goal is to help where I can whether you're a beginner or more advanced penetration tester. I believe giving back is the best way to do so because in the industry of penetration testing, it is so do for yourself and not alot of people want to help especially when it comes to the 1 to 1 aspect. I was able to find that here at MentorCruise and I want to start changing that aspect about Penetration Testers specifically and start a tradition that we can help beginners, guide them and not in just groups but 1 to 1 sessions. I will work with you to find out what you're needs and goals are and we will come up with a plan to achieve these. I believe since I started from scratch I can help alot of people who would like to do the same. I know the process to go from 0 to hero. Any subject I can help I will and I will make sure it is afforable here. Penetration Testing and Cyber Security is my passion. It's a life style for me and not a 9 to 5. I approach it and treat it the same way I did professional basketball and thats the same mentality I will have when mentoring anyone who would like to have me as a mentor. I look forward to hearing from you all and fill free to ask any questions. Thank you, Ryan :)IT Security Best Practices • Information Technology • Information Security • Cloud Security • Computer Security • Security • Network Security • Information Security Management • Penetration Testing • Internet Security •$1/min per minute— — 0
-
JSJosé SimõesIT specialist, security, networking and admin • LisbonIT security specialist, worked for the Portuguese Ministry of Foreign Affairs, currently working for a Bank.IT Security Best Practices • Office 365 • Microsoft Office • System Administration • Cryptography • Encryption • Cyberlaw • Cryptocurrency •$1/min per minute— — 0
-
JJJames JohnsonDenver, COFounder of Professional Consulting Services & Solutions. Specialize in IT compliance and governance programs including security, project management, architecture, change & configuration management.IT Security Best Practices • Executive Coaching • IT Operations • IT Governance •$4.17/min per minute— — 0
-
RCRohit ChaurasiaMumbaiCybersecurity Savant | Helped the Government of India & Government of Thailand Secure Their Cyber Infrastructure | CISSP & CCSP Certified (781238) | IT & Security Strategy SpecialistIT Security Best Practices • Information Security • IT Strategy • Cloud Security • Network Security • Information Security Management •$1/min per minute— — 0
-
RURichard Ubechu#1 Habit Building Coach | Self-Improvement CoachHabit Building Coach | Self-Improvement Coach | Passive Income Expert | Relationship CoachIT Security Best Practices • Trade Show Strategy • Relationship Coach • Self-confidence • Passion for Helping Others •$1/min per minute— — 0
-
AAAnand AggarwalCIO/CISO, Digital TransformationTechnology & business leader with more than 25yrs experience in BFSI, Telecom & BPO sector. Worked with ICICI, Infosys & Vodafone IdeaIT Security Best Practices • Digital Strategy • IT Management • IT Strategy • Digital Transformation • IT Operations • Small Business Lending •$2/min per minute— — 0
-
RARoota AlmeidaNew JerseyRoota Almeida is the Chief Information Security Officer at Delta Dental of New Jersey and Connecticut (DDNJ, Inc.). Roota has been instrumental in helping to establish Delta Dental of New Jersey’s Office of Information Security and leading the development and implementation of enterprise-wide information security strategy, policies, risk assessments and controls. She believes more women should be encouraged to pursue STEM careers and has started a summer internship program at DDNJ, Inc. specifically designed to give graduating female high school students insight into the field of corporate cybersecurity. Prior to joining Delta Dental, Roota was the Chief Information Security Officer (CISO) at Covanta Holdings Corp., a leader in Energy-from-Waste. As CISO, she led all aspects of Information security and risk, including global information security awareness programs, policies, business continuity, and incident response teams. With over 15 years of direct experience in establishing and maintaining global security strategies, architectures, standards, and compliance Roota drives the necessary cultural changes to affect measurable improvements in organizations’ security posture. Roota is a recognized industry thought leader who serves as a member of the Board of Advisors at several organizations, a governing body chair for Evanta’s NJ CxO Summits and other technology conferences, a faculty and a security awards judge. Her in-depth experience and expertise in the field of information security and risk management can be measured by the various articles, eBooks, interviews, and podcasts she has to her credit. Roota is also working to build and encourage new talent and solutions in the security arena. Roota holds CCISO, CISSP, CISM and CRISC certifications.IT Security Best Practices • Information Security • Cloud Security • Risk Management • Computer Security • Security • Network Security • Risk Mitigation • Information Security Management • Security Management •$3.33/min per minute— — 0
-
JRJohn ReachSecurity Researcher/Programmer- I have extensive experience in finding vulnerabilities - I study and improve my skills every day - I participate in various CTF events - I know not only how to attack, but also how to protect the target resource - I program in Python/C#/C++IT Security Best Practices • Web Design • Information Security • Cloud Security • Computer Security • Security • Network Security • Information Security Management • Security Audits • Internet Security •$2/min per minute— — 0
the startups.com platform
Copyright © 2025 Startups.com. All rights reserved.