Loading...
Security Management
Menu30 experts in Security Management topic
-
RARoberto AriasInformation Security Specialist • Berlin, GermanyInformation security expert. International experience across multiple businesses from fintech to healthcare. Giving expert advice in matter of information security and privacy: Ethical Hacking, Cybersecurity, Vulnerability Assessments, Penetration Testing, Disaster Recovery Plans, Data Breaches, Cloud Security (AWS/GCP), GDPR compliance, cryptocurrencies and other related topics.Security Management • Privacy • Information Technology • Information Security • Information Architecture • Cloud Security • Security • Data Privacy • Security Audits • Internet Security •$2/min per minute5.0 12 8
-
RPRohan PintoSolutions Architect at City of Mississauga • Toronto, Canada AreaIdentity Management & Security Architect Senior Identity and Access Management Architect specialized in architecting, implementing and deploying large-scale Identity Management and Authentication and Authorization (RBAC,ABAC, RiskBAC,TrustBAC) infrastructures with specific interests involving Security, Identity, Federation and Access Management and Web 2.0 based systems. Strong technologist with both the strategic vision and tactical intelligence to lead technology-based growth initiatives grounded solidly on business value. Extensive experience and knowledge in all phases of project life cycle management using agile process methodologies with an emphasis on practical application to improve security and compliance. Strong technical leadership in large project environments. Deep expertise in large-scale distributed system architectures that utilize Open Standards, Web Services, Java, and Open Source Technologies. Specialties Identity Management - Sun IdM, Vitria, Apere IDM, ICRare Federation and Access Management - Sun Access Manager, OpenSSO, Siteminder, Oblix, IBM Tivoli AM, CardSpace Risk and Compliance - Sun Role Manager Enterprise Java (J2EE/EE) and Web services (SOAP, WS Security) Web Development - PHP, Python, Java, RoR Methodology and Governance Project Management and Leadership Open source and Open standard technologies AJAX (jQuery/YUI), OSGI,C/C++,ESB,SCA,HL7, TIBCOSecurity Management • Java • Security • Network Security • Application Security • LDAP • SAML • IDM • Workflow Analysis • Data Security •$4.17/min per minute4.2 5 36
-
CSCourtney SparkmanCEO, Founder at OfficerReports.com • Greater Chicago AreaFounder and CEO at OfficerReports.com. OfficerReports.com is a company dedicated to helping security guard vendors optimize their business practices. Founder and VP, Operations at Cequr Security, LLC. Cequr was a security guard contractor that provided security guard services in the Chicagoland area. Cequr was sold to a regional security guard contractor in 2009.Security Management • Business Development • Sales • Product Development • Strategic Planning • New Business Development • Management • Contract Negotiation • Security •$3.33/min per minute3.5 3 1
-
DCDavid ClarkeGDPR , Cyber Security "Top 50 Global Experts" • London***How To GUARANTEE You can Make Your GDPR, Data Protection, Security, ISO27001, Cyber Essentials PAINLESS: Let's Talk, 23 FREE Technologies in Data and Cyber protection that will make you feel shocked! see link below https://gdpruk.eu/index.php/23-free-data-cyber-protection-technologies/ Avoid the Following RISKS. ~~~Fines, Loss of Business, Enforcement Action, BreachLess Liability, Breach Losses~~~ #Breaches are now reportable (72 Hours) (59,000 reported in Europe so far) #Class Actions/Group Actions for GDPR (Happening now all over the world) #Incorrect Privacy Notices (Emma's Diaries and others) #Risk Of Data Breach is $7% UK Government Figures #3rd Party Contract Checks by Data Protection Authorities, Danish DPA #Privacy Notice Checks By Data Protection Authorities #Complaints by Consumers over 40,000 in the UK so far, ***Alignment with Data Protection will REQUIRE ....... • GDPR Awareness Article 39, Article 47 - Legal Requirement • Breach Notification Procedure process Article 33, Article 34 - Legal Requirement • Data Protection Impact Assessment DPIA Article 35 - Legal Requirement • Record Of Processing Article 30 - Legal Requirement • Data protection Maturity Assessment Article 5 + Security Audits/ISO27001/PC-DSS/GDPR Cyber Security and Data protection Risk Management Policy and Procedure review (Security Policy, Retention Policy, Data Protection Policy etc..) Expected by the GDPR and Data Protection Legislation. No Matter what your situation GDPR alignment and direction of GDPR can be always improved, Because I have done this many times for all types of businesses and size of business. If YOU were to do only one thing I would suggest a FIXED Price Data Protection/GDPR maturity audit which highlights any gaps in your businesses Data protection program and planning and enables the risks to be managed. Book a call for FREE on https://clarity.fm/1davidclarke/BookAcall "Top 50 Global Experts" "Top 10 Risk Compliance Regtech" David Clarke is the Founder of GDPR Technology Forum over 18500 members https://www.linkedin.com/groups/12017677 and an internationally known GDPR and security advisor. He is recognized as one of the top 10 influencers by Thompson Reuter’s “Top 30 most influential thought-leaders and thinkers on social media, in risk management, compliance and regtech in the UK” and is in the the top 50 list of Global Experts by Kingston Technology. For more information, visit his Linkedin https://www.linkedin.com/in/1davidclarke and follow him on Twitter at @1DavidClarke 84k FollowersSecurity Management • Information Security • Security • Network Security • Data Privacy • PCI DSS • Information Security Management • Governance • Compliance • ISO 27001 •$1/min per minute5.0 5 2
-
MAMoustafa AHMED HASSANHead of CyberSecurity Solutions Engineering • Cairo- Managed cyber security solutions are as follows:• SentinelOne EDR• McAfee IPS, Arbor Anti-DDoS, Vectra AI NDR• OT (Operational Technology) Security Nozomi, MS Defender, CiscoCyberVision• BlueCoat ProxySG, Cisco WSA, F5 BigIP• Juniper SRX, Palo Alto Firewalls• SASE (SWG, ZTNA, CASB, FWaaS) and DLP Solutions (Zscaler, Palo AltoPrisma - SDWAN, Netskope, and Cisco Umbrella) • Ivanti Pulse Secure and Thales Safenet Identity and Access Management• Creating on-prem and cloud cybersecurity solutions built on Azure, AWS, orGCP• Vulnerability Management via continuous identification, evaluation, andmitigation• A team of developers focused on building secure and efficient full-stack ELKlog management and monitoring platforms using Python, JavaScript, Node.js,and containers incorporating DevSecOps tools and principles throughout thedevelopment lifecycle.• Developing automation using Ansible and AI/ML-integrated CI/CD pipelinesto streamline SOC processes like alert handling and playbook creation.Collaborating with technical leads to ensure automation adheres to customerrequirements and best practices, integrating security tools and services intothe ELK SIEM, SOAR or CTI solutions.• Lab Testing and Validation- Manage employee hiring, onboarding, and offboarding processes for theteam. Page 1 of 5 - Supervise activities between internal and external resources, and facilitatesmooth workflow for service delivery.- Develop team training plan, and ensure all team received the requiredbusiness, interpersonal skills, technical training, coaching and mentoring. - Constantly monitor, measuring and guide team towards compliance toprocedures, performance targets, short and long-term goals and overall KPIsset for the department and for team individuals.- Estimate yearly CAPEX/OPEX.- Revise team ISO 27001 compliancy with CIO and report back any threats &risks detected.Security Management • Information Technology • Information Security • Cloud Services • Cloud Security • DevOps • Computer Security • Network Security • Information Security Management •$1.67/min per minute5.0 1 1
-
RSRadu StanescuSenior Information Security Consultant • Bucharest, BrusselsSenior Information Security Consultant for several Govermental Institutions. Cybersecurity Entrepreneur. Cybersecurity MentorSecurity Management • Information Security • Computer Security • Network Security • Information Security Management • IT Security Best Practices • Internet Security •$3.33/min per minute5.0 1 1
-
JAJared AblonExited Bootstrapped Startup, CISO of the year • Santa Monica, CAFounder and CEO at HackEDU. Successfully grew and sold to private equity for high 8 figure exit. CISO of the Year award recipient - Los Angeles Business Journal Fourteen years of experience in cutting edge technology with proven expertise in solving complex security problems for the U.S. Government as a Senior Leader. CISSP, MBA, and MS in Applied and Computational Mathematics focusing on computer/cyber security; management; risk assessment; cryptanalysis; and entrepreneurship. I help companies improve risk management, increase security efficacy, streamline security operations, and enable business flexibility. I speak the language of business while understanding the latest security threats. Specialties: Cyber Security Leader, Information Security, Application Security, Network Security, Security Operations Center (SOC), Penetration Testing, Forensics, Encryption, CISO, C, Perl, PHP, Python, HTML, Windows, Unix, Mac OS. Certified Information Systems Security Professional (CISSP).Security Management • Information Security • Cloud Security • Computer Security • Security • Network Security • Information Security Management • Internet Security •$16.67/min per minute5.0 1 1
-
HAHassan AhmedCTO and co-founder of Respond.io • Kuala Lumpur, MalaysiaMy expertise lies in the following areas: - Business Messaging (CRMs) - Information Security - AWS Architecture - Continuous Integration & Deployment (CI/CD) - Full Stack Development - User Interface (UI) Design - Team Leadership - Strategic Management - Process OptimizationSecurity Management • Information Technology • Cloud Computing • Cloud Consulting •$1.67/min per minute— — 0
-
ZWZain WalkerOffering tailored cybersecurity assessments • Dallas, TXCybersecurity Expert | Principal Security Analyst | Security Consultant | Author | Content CreatorSecurity Management • Information Security • Cloud Security • Computer Security • Network Security • Information Security Management • Security Audits •$2.50/min per minute— — 0
-
FDFrank DiMartinoGrowth Consultant, Sales Ops & Tech Matchmaker • Boston, MAEntrepreneur and Growth Consultant. Founder of Serverli. Technology enthusiast. VP at Pivot3 and Quantum. Expert in sales and SaaS growth. Advisor and mentor to tech startups. Passionate about scaling businesses.Security Management • Business Development • Start-ups • Leadership • Sales Strategy • Team Building • Strategic Planning • Business Strategy • Strategic Alliances • Sales Growth •$5.83/min per minute— — 0
-
JNJayme NeeleyUnited States Army veteran, with management of security operations within a multitude of differentiating occupations; pharmaceutical manufacturing, distribution center assets protection and private retail loss prevention.Security Management • Leadership • Manufacturing • Team Leadership • Management • Computer Science • Computer Security • Security • Network Security • Pharmaceutical Industry •$1.67/min per minute— — 0
-
KZKarim Zidanioffensive security expert: red teaming; hacking • RotterdamWith over a decade of experience in offensive cyber security, I'm a seasoned expert, and I can help you identify the risks in your systems; possibly show you how I hack them before the malicious users do. I can also provide you with a security posture of your company by engaging in red teaming and attack simulations.Security Management • Hacking • Information Technology • Information Security • Computer Security • Security • Network Security • Information Security Management • Security Audits • Internet Security •$2.92/min per minute— — 0
-
RPRob Pierson15 year Basketball Coach, Trainer, Entrepreneur • Denver, COOwner/Lead Trainer Colorado Shine Basketball Academy, Motivational Speaker, College Recruitment Advisor to student athletes, Founder iAthletePromotions.comSecurity Management • Business Development • Leadership • E-commerce • Management • Training • Salesforce.com • B2B • Account Management • Security •$2/min per minute— — 6
-
SLSam LodhiPractical & Business Aligned Cyber Security Expert • London, UKLondon Entrepeneur. CEO/Managing Director of I.B.R.S Group, Founder of Kerberus Cyber Security. Investor and board member on 20 businesses. Trustee of Lodhi Foundation - giving back to make the world a better place.Security Management • Information Security • Cloud Security • Computer Security • Security • Network Security • Information Security Management • Security Audits • IT Security Best Practices • Internet Security •$16.67/min per minute— — 0
-
SHSteve HigdonWhat is your risk? - Virtual CISO - • Washington, D.C.Are you a startup, small business or enterprise seeking advice on protecting your organization's data? Do you wonder how hackers or insiders can impact your business? I have a passion for helping YOU improve and succeed! I have an established track record with over a decade of senior work experience in IT and Security positions within both public and private organizations, providing consultancy, expert advice, and long term solutions, while also serving in training and management roles. I have earned several industry certifications and both undergraduate and graduate degrees in Cybersecurity. I also earned an MBA in order to get a better understanding of how information security can both impact and compliment key business functions and processes of an organization. If there is a way that I can help, please send me a general overview of your concerns and other specific information before the call so I can ensure that our time is maximized. For a more comprehensive view of my experience, education, and expertise, please visit my LinkedIn profile (https://www.linkedin.com/in/steve-p-higdon-cissp-a4591950) and personal website (http://stephenhigdon.com)Security Management • Information Security • Company Culture • Computer Security • Security • Network Security • Culture Change • Information Security Management • Security Audits • Internet Security •$1/min per minute— — 0
-
ASAdam SculthorpeEntrepreneurAdam has over 19 years of experience in the security and technology industry, including consulting for many Fortune-500 companies. He protected over US$350 billion in daily banking transactions for top Swiss and U.S. investment banks and has extensive security intelligence experience. Throughout his career, Adam has developed a range of security intelligence solutions for clients in various industries, including Police, Government, Military, Financial and Corporate. His solutions protect businesses and communication infrastructure from data centers to global military satellite systems, safeguarding troops and their families. Adam's expertise has been recognized globally, and he has been interviewed by various media outlets such as television, radio, and worldwide press. He has discussed topics ranging from online banking threats to cyber wars and has been featured in The New York Times, The Register, and Gadling, among others. Media: TV Interview with Kevin O’Leary Radio Shalom – Threats to online banking customers The New Scientist – Software bots could menace Google ads The Register – Botnets strangle Google Adwords campaigns New York Times – Web Marketers Fearful of Fraud in Pay-per-click (client) Gadling – Destination tool promises increased travel safety Radio Shalom – Cyberwars “The New Frontier”Security Management • Entrepreneurship • Marketing Strategy • Technology Management • Technical Marketing • Amazon Web Services (AWS) • Security • Information Security Management • Strategic Thinking • IT Security Best Practices •$16.67/min per minute— 2 5
-
JCJared CooperbandCISM, CISSP-ISSMP, CISSM, CISSO, CSLO, CCISO, EISM • TorontoCybersecurityl leader, consultant, advisor. Virtual CISO. Vulnerability Management, Threat Intelligence, Security Operations, Endpoint Protection, Data Loss Prevention.Security Management • Information Security • Computer Security • Network Security • Vulnerability Assessment • Information Security Management • Vulnerability Management • Threat & Vulnerability Management • IT Security Best Practices • Internet Security •$1/min per minute— — 0
-
JMJoe MorinI am a Cyber Security Expert. 20 years experience. • Rochester, NYComodo - Sales Engineer Leader in cyber security Zscaler - sales engineer leader for cloud based network security Barracuda - WW partner enablement manager selling and servicing security and data protection services Websense - WW partner enablement manager selling and services security solutions Xerox - technical progra manager for world wide data center consolidation effortSecurity Management • Information Security • Cloud Security • Computer Security • Security • Network Security • Channel Partners • Information Security Management • Channel Management • Internet Security •$3.33/min per minute— — 0
-
JSJay SchulmanSolving Security Problems • Chicago, IL, USAInformation Security Consultant. Security career coach at JaySchulman.com. Focused on helping you solve your security problems and helping security professionals grow their careers.Security Management • Information Security • Cloud Security • Computer Security • Security • Network Security • Information Security Management • Security Audits • Internet Security •$1.67/min per minute— — 0
-
CMCurtis MechlingEngineer, Developer, InfoSec Researcher • Jacksonville, FLComputer scientist, security researcher, electrical, and software engineering with over two decades of experience in these areas. Worked with computers and electrical circuits since and early age, which has always been a passion. Studied drafting and engineering, with a focus on digital electronics, throughout high school and college. Received degree in Information Security from University of Advancing Technology. 20 years of real-world experience in these skills with a Fortune 10 employer. Enjoy teaching these skills as well to peers, and aspiring innovators. Occasionally teach and sponsor youth level STEM events with basic Electrical Circuit building workshops. Have consulted for other Fortune 10 and Fortune 500 corporations in the subject of embedded system security and vulnerability testing.Security Management • Product Development • Software Engineering • Information Security • Computer Security • Security • Network Security • Information Security Management • Security Audits • Internet Security •$3.33/min per minute— — 0
-
JGJonnathan GriffinSecurity Engineer • Oslo, NorwaySecurity Engineer and Penetration tester @ Telcom, Financial and Healthcare sectors. also: american, entrepreneur, security engineer, startup fanboy & penetration tester, former Goldman Sachs & Telenor Digital.Security Management • Web Applications • Mobile applications • Information Security • Cloud Security • Network Security • Scalable Web Applications • Penetration Testing • Web Application Security • Internet Security •$1/min per minute— — 0
-
EJEric JackschCybersecurity expert • Ottawa, OntarioI have more than 20 years of security experience working with businesses of all sizes. I help my clients find effective security strategies that work in the real world.Security Management • Information Security • Cloud Security • Computer Security • Security • Network Security • Information Security Management •$3.33/min per minute— — 0
-
USUjjwal SharmaPersonal Security always comes first • Chandigarh, IndiaI am a Cyber Security student who knows how to protect personal devices from getting hacked. I have done bug bounty previously and I am present in samartsheet.com's hall of fame.Security Management • Information Security • Cloud Security • Computer Security • Security • Network Security • Information Security Management • Internet Security •$1.67/min per minute— — 0
-
BKBibin K RPhysical Security Expert • Karwar/KarnatakaA Naval Veteran with 17 years of hands on experience in various facets of Physical SecuritySecurity Management • Training • Risk Management • Crisis Management • Physical Security • Emergency Management •$2.50/min per minute— — 0
-
MBMartyn BoothExperienced Chief Information Security Officer • LondonI'm an experienced information security professional, currently running security for a large global data business based in the UK. I have experience in information security, risk and privacy. I sit on the board of two large charities, provide mentoring services to junior security leaders and provide investment advice to incubators and investors in security technologies.Security Management • Information Technology • Information Security • Cloud Security • Computer Security • Network Security • Information Security Management • Security Audits • IT Security Best Practices • Internet Security •$2/min per minute— — 0
the startups.com platform
Copyright © 2025 Startups.com. All rights reserved.