SlideShare a Scribd company logo
1 of 18
Download to read offline
Profile
In this rapidly evolving IT sector and our dependence on computers in all aspect of our business and the even more
dependence on the internet usage, security becomes the vital key in safe guarding our data from pilferage and
misuse. There are many software and hardware available in the market to protect our computers and its data but very
often the user is not advised correctly from his application stand point, be it in choosing the right Hardware, Software,
Networking Etc. Hence we over spend and underutilise and still have very unstable IT Infrastructure susceptible to
Data Pilferage and Abuse.
Having said that, I have taken it as a challenge to give what the industry needs in terms of investment to returns be it
investment in Hardware, Software, Security in data management etc. With this challenge in mind I went on to do my
PhD in Information security. And having worked for close to two decade in various large establishments. I have gained
a fair amount of understanding on the optimisation and protection of the investment in IT for any business enterprises
be it Small Medium or Large.
Keeping this challenge in mind me and my team of professional drawn from their respective fields came under this
umbrella called HK IT Solutions an end to end IT Solution company providing that cutting edge advantage to our clients
in terms of giving our recommendations in setting up or managing the existing IT Infrastructure that would suit their
application and budget.
Keeping this challenge in mind me and my team of professional drawn from their respective fields came under this
umbrella called HK IT Solutions an end to end IT Solution company providing that cutting edge advantage to our clients
in terms of giving our recommendations in setting up or managing the existing IT Infrastructure that would suit their
application and budget.
Optimisation in terms of utility and cost being our fundamental basis to start this organisation, we have our market
research team who are in the process of continuously scanning the market and keeping us updated in the latest
technologies available and also newer challenges our clients come up with. We share these developments with our
clients by way of periodical news letter by e-mail.
We have to our credit a very small client base both in India and overseas who are extremely appreciative to our
perspective in carrying forward our ambition to optimise and secure their IT Infrastructure. This has helped us in
reassuring ourselves that this is what a client in need of.
Above all as a policy we share our knowledge with the younger generation by giving them training programmes at
the college levels so that they become better IT Professional having a holistic approach.
… Dr. THENNARASU.E (HARSHA) PhD (IS)
CEO
IT Consultancy Services
 IT Managed Services
 Software Copy rights legal
advice
 Network Design
 Data Center Design
 Firewall (Hardware/Software)
 ASC (Annual Service Contract)
 SAP solutions
 Staff Training on Information
security
 Cyber crimes/ & vulnerabilities
 Mailing Solutions
 Internet Bandwidth Solutions
 IT Inventory Management
 Anti Virus & Security Software
 IT Outsource
 Virtualization (Server/Desktop)
 Video Conferencing (Tanburg, Polymer)
 Document collaborations (Share Point)
 Cost effective solutions on all IT requirement
& challenges
 Bulk Mailing & Bulk SMS
 IT Managed Services
 Software Copy rights legal
advice
 Network Design
 Data Center Design
 Firewall (Hardware/Software)
 ASC (Annual Service Contract)
 SAP solutions
 Staff Training on Information
security
 Cyber crimes/ & vulnerabilities
 Mailing Solutions
 Internet Bandwidth Solutions
 IT Inventory Management
 Anti Virus & Security Software
 IT Outsource
 Virtualization (Server/Desktop)
 Video Conferencing (Tanburg, Polymer)
 Document collaborations (Share Point)
 Cost effective solutions on all IT requirement
& challenges
 Bulk Mailing & Bulk SMS
IT Security Audits/ Assessments
Methodologies
4
Methodologies
Phase 1
Preliminary
Review
Phase 2
Scope of ISMS
Phase 3
GAP Analysis
Phase 4
Risk Assessment
Phase 5
Risk Mitigation
and Selection of Controls
Phase 6
Redesign of Security
Architecture
(Optional)
Phase 7
Policy and
Procedures Drafting
Phase 8
Incident
Managemen
t
5
Phase 9
Design of
BCP/DRP
Phase 10
Design of Audit
Charter
Phase 11
Security Awareness
Program
Phase 12
Security Metrics
Phase 16
Periodic Review
(Optional)
Phase 15
Certification
Phase 14
Internal Audits Phase 13
Implementation of
controls
(We would provide
Guidance)
Information Security Assessments
Risk Analysis/Gap Analysis/VA/PT
& Trainings
SOX/ISO/COBIT/HIPAA & Other International Standards
Clienteles in India / Overseas
Our IT Security Specialists:-
Dr. THENNARASU.E (Harsha) PhD
Researcher Information Security on High End Applications
Information Security Assessment expert
Member of DSCI (Data Security Council of India)
Trainer Certified Ethical Hacker
Overseas Auditing Experience
Guest Lecturing (Universities, Colleges)
Guest Speaker of Innovating for India Seminar
Dr. CHANDRASEKAR UMAPATHY (PhD, IIM)
OWASP Chennai Chapter Lead
Sri Lanka OWASP Chapter Mentor
Invited Trainer at OWASP India conference.
Cloud Alliance Security Chennai Chapter Lead.
Reviewer of ISACA CRISC Review Manual 2011.
Cloud Security Alliance – Control Matrix Co-Author
ISACA Best Trainer for the Year 2011-2012
7
Our IT Security Specialists:-
Dr. THENNARASU.E (Harsha) PhD
Researcher Information Security on High End Applications
Information Security Assessment expert
Member of DSCI (Data Security Council of India)
Trainer Certified Ethical Hacker
Overseas Auditing Experience
Guest Lecturing (Universities, Colleges)
Guest Speaker of Innovating for India Seminar
Dr. CHANDRASEKAR UMAPATHY (PhD, IIM)
OWASP Chennai Chapter Lead
Sri Lanka OWASP Chapter Mentor
Invited Trainer at OWASP India conference.
Cloud Alliance Security Chennai Chapter Lead.
Reviewer of ISACA CRISC Review Manual 2011.
Cloud Security Alliance – Control Matrix Co-Author
ISACA Best Trainer for the Year 2011-2012
Our IT Security Specialists:-
Mr. RAJENDRAN
Certified CISP from Dept of IT Govt of India
Subject matter expert & Trainer for Tamil Nadu Police academic
Active member and the Treasurer of Cyber Society of India.
Pursuing PhD in the area of Cyber Crime in Banks
Member of Indian Society of Victimology
8
Mr. TS. RAGHUNATHAN,
Certified security professional by Cisco, Cyberoam, Watchguard, etc.,
Practitioner Information & Network Security assessments/audits
VA/PT specialist
Certified Ethical Hacker
12 year experience in Information & Network Security Domains
Benefits by IT Assessments/ Audits
Restructured Operations aligned with business needs
An informed view of organizational security posture
First-hand knowledge about organizational security shortcomings in
processes and technologies
Increase in confidence levels after getting IT Audited/Assessed
Understanding of benefits with a proactive approach to IT security
Added selling point in offering secured services
Increase in customer confidence levels
Secure information infrastructure aligned with business needs
Justified optimal solutions to provide maximum return on objectives
Improved quality of service due to performance optimization
9
Benefits by IT Assessments/ Audits
Restructured Operations aligned with business needs
An informed view of organizational security posture
First-hand knowledge about organizational security shortcomings in
processes and technologies
Increase in confidence levels after getting IT Audited/Assessed
Understanding of benefits with a proactive approach to IT security
Added selling point in offering secured services
Increase in customer confidence levels
Secure information infrastructure aligned with business needs
Justified optimal solutions to provide maximum return on objectives
Improved quality of service due to performance optimization
Our Expertise
INNOVATING FOR INDIA SEMINAR @ BISHOP COTTON WOMEN’S CHRISTIAN COLLEGE
ADDRESSED BY Dr. HARSHA, Chief IT Security Advisor
Information Security Training to Vijay Bank, HO
E-waste Collection Program for
supporting
Senior Citizens
CSR Initiative to generate
revenue for NGO
In partner with
Dignity Foundation
Articles – Head Consultant
Articles – Head Consultant
Articles – Head Consultant- Feb’ 2013
Clients
Partners
Thank you IT Consultations
@
www.hkit.in

More Related Content

What's hot

Mukesh infoserve
Mukesh infoserveMukesh infoserve
Mukesh infoservePixel
 
Accelerating digital transformation — with Actionable Insights
Accelerating digital transformation — with Actionable InsightsAccelerating digital transformation — with Actionable Insights
Accelerating digital transformation — with Actionable InsightsPlantronics
 
OpenText PowerDOCS: A Cloud Solution for Document Generation
OpenText PowerDOCS: A Cloud Solution for Document GenerationOpenText PowerDOCS: A Cloud Solution for Document Generation
OpenText PowerDOCS: A Cloud Solution for Document GenerationMarc St-Pierre
 
2° Sessione Oracle - CRUI: Internet of Things in a Real-World, Use Cases and ...
2° Sessione Oracle - CRUI: Internet of Things in a Real-World, Use Cases and ...2° Sessione Oracle - CRUI: Internet of Things in a Real-World, Use Cases and ...
2° Sessione Oracle - CRUI: Internet of Things in a Real-World, Use Cases and ...Jürgen Ambrosi
 
comspace technology profile
comspace technology profilecomspace technology profile
comspace technology profileWao Wamola
 
Bring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective programBring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective programBrent Spencer
 
IGSS Corporate Briefing
IGSS Corporate BriefingIGSS Corporate Briefing
IGSS Corporate Briefingmrsjennbrown
 
CDW Overview
CDW OverviewCDW Overview
CDW Overviewmelcash
 
Inspace corporate presentation
Inspace corporate presentationInspace corporate presentation
Inspace corporate presentationArish Roy
 
It Technical Support
It Technical SupportIt Technical Support
It Technical SupportElena Benson
 
Solutions Overview
Solutions OverviewSolutions Overview
Solutions Overviewmelcash
 
IT Global Certification
IT Global CertificationIT Global Certification
IT Global CertificationSuresh Patel
 
Working with remote teams - challenges and mitigations
Working with remote teams - challenges and mitigationsWorking with remote teams - challenges and mitigations
Working with remote teams - challenges and mitigationsContinuousexcellence
 
How Watson Works
How Watson WorksHow Watson Works
How Watson Workskcortis
 
resume. system admin
resume. system adminresume. system admin
resume. system adminRanganath V S
 
IoT-Enabled Predictive Maintenance
IoT-Enabled Predictive MaintenanceIoT-Enabled Predictive Maintenance
IoT-Enabled Predictive MaintenanceCloudera, Inc.
 

What's hot (20)

Mukesh infoserve
Mukesh infoserveMukesh infoserve
Mukesh infoserve
 
Accelerating digital transformation — with Actionable Insights
Accelerating digital transformation — with Actionable InsightsAccelerating digital transformation — with Actionable Insights
Accelerating digital transformation — with Actionable Insights
 
Product engineering services at a glance
Product engineering services at a glanceProduct engineering services at a glance
Product engineering services at a glance
 
OpenText PowerDOCS: A Cloud Solution for Document Generation
OpenText PowerDOCS: A Cloud Solution for Document GenerationOpenText PowerDOCS: A Cloud Solution for Document Generation
OpenText PowerDOCS: A Cloud Solution for Document Generation
 
2° Sessione Oracle - CRUI: Internet of Things in a Real-World, Use Cases and ...
2° Sessione Oracle - CRUI: Internet of Things in a Real-World, Use Cases and ...2° Sessione Oracle - CRUI: Internet of Things in a Real-World, Use Cases and ...
2° Sessione Oracle - CRUI: Internet of Things in a Real-World, Use Cases and ...
 
comspace technology profile
comspace technology profilecomspace technology profile
comspace technology profile
 
Bring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective programBring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective program
 
IGSS Corporate Briefing
IGSS Corporate BriefingIGSS Corporate Briefing
IGSS Corporate Briefing
 
IT Portfolio
IT PortfolioIT Portfolio
IT Portfolio
 
CDW Overview
CDW OverviewCDW Overview
CDW Overview
 
Inspace corporate presentation
Inspace corporate presentationInspace corporate presentation
Inspace corporate presentation
 
It Technical Support
It Technical SupportIt Technical Support
It Technical Support
 
Why CDW
Why CDWWhy CDW
Why CDW
 
Solutions Overview
Solutions OverviewSolutions Overview
Solutions Overview
 
IT Global Certification
IT Global CertificationIT Global Certification
IT Global Certification
 
Working with remote teams - challenges and mitigations
Working with remote teams - challenges and mitigationsWorking with remote teams - challenges and mitigations
Working with remote teams - challenges and mitigations
 
M A MOHEED IT
M A MOHEED ITM A MOHEED IT
M A MOHEED IT
 
How Watson Works
How Watson WorksHow Watson Works
How Watson Works
 
resume. system admin
resume. system adminresume. system admin
resume. system admin
 
IoT-Enabled Predictive Maintenance
IoT-Enabled Predictive MaintenanceIoT-Enabled Predictive Maintenance
IoT-Enabled Predictive Maintenance
 

Similar to HK IT Security Consultant Profile

Pkf advant edge_orientation3
Pkf advant edge_orientation3Pkf advant edge_orientation3
Pkf advant edge_orientation3pkfavantedge
 
Microsoft Online Services
Microsoft Online ServicesMicrosoft Online Services
Microsoft Online Servicesbeckyjacobs
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016SteveAtHPE
 
Misha Infotech Delivering Excellence with Interactive IT services.
Misha Infotech Delivering Excellence with Interactive IT services.Misha Infotech Delivering Excellence with Interactive IT services.
Misha Infotech Delivering Excellence with Interactive IT services.Misha Infotech
 
All Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of EverythingAll Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of EverythingInside Analysis
 
Eminence Technology Presentation
Eminence Technology PresentationEminence Technology Presentation
Eminence Technology PresentationAmit Pareek
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company ProfileKGanzy
 
Technisource Overview
Technisource  OverviewTechnisource  Overview
Technisource OverviewJav360
 
Technisource Overview
Technisource OverviewTechnisource Overview
Technisource Overviewguestaa29dc
 
Penntech Services Infodeck.ppsx
Penntech Services Infodeck.ppsxPenntech Services Infodeck.ppsx
Penntech Services Infodeck.ppsxElaineLadyman1
 
Teneo_Corporate_Brochure
Teneo_Corporate_BrochureTeneo_Corporate_Brochure
Teneo_Corporate_BrochureAllen Wilkes
 
Corporate Technologies
Corporate TechnologiesCorporate Technologies
Corporate TechnologiesJhill324
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Net at Work
 
Ahamed Khaleel K.P
Ahamed Khaleel K.PAhamed Khaleel K.P
Ahamed Khaleel K.PKhaleel KP
 
Arriys Infosoft Consulting Services
Arriys Infosoft Consulting ServicesArriys Infosoft Consulting Services
Arriys Infosoft Consulting Servicesitrecruiter_sandy
 

Similar to HK IT Security Consultant Profile (20)

Hki tsecuritysolutionsv1.1
Hki tsecuritysolutionsv1.1Hki tsecuritysolutionsv1.1
Hki tsecuritysolutionsv1.1
 
Information security presentation
Information security presentationInformation security presentation
Information security presentation
 
Pkf advant edge_orientation3
Pkf advant edge_orientation3Pkf advant edge_orientation3
Pkf advant edge_orientation3
 
6 aproaches
6 aproaches6 aproaches
6 aproaches
 
Microsoft Online Services
Microsoft Online ServicesMicrosoft Online Services
Microsoft Online Services
 
IT SERVICES
IT SERVICESIT SERVICES
IT SERVICES
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 
Misha Infotech Delivering Excellence with Interactive IT services.
Misha Infotech Delivering Excellence with Interactive IT services.Misha Infotech Delivering Excellence with Interactive IT services.
Misha Infotech Delivering Excellence with Interactive IT services.
 
All Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of EverythingAll Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of Everything
 
Eminence Technology Presentation
Eminence Technology PresentationEminence Technology Presentation
Eminence Technology Presentation
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company Profile
 
Technisource Overview
Technisource  OverviewTechnisource  Overview
Technisource Overview
 
Technisource Overview
Technisource OverviewTechnisource Overview
Technisource Overview
 
Penntech Services Infodeck.ppsx
Penntech Services Infodeck.ppsxPenntech Services Infodeck.ppsx
Penntech Services Infodeck.ppsx
 
Teneo_Corporate_Brochure
Teneo_Corporate_BrochureTeneo_Corporate_Brochure
Teneo_Corporate_Brochure
 
Corporate Technologies
Corporate TechnologiesCorporate Technologies
Corporate Technologies
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
Ahamed Khaleel K.P
Ahamed Khaleel K.PAhamed Khaleel K.P
Ahamed Khaleel K.P
 
Arriys Infosoft Consulting Services
Arriys Infosoft Consulting ServicesArriys Infosoft Consulting Services
Arriys Infosoft Consulting Services
 
Cisco Managed Security
Cisco Managed SecurityCisco Managed Security
Cisco Managed Security
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

HK IT Security Consultant Profile

  • 1.
  • 2. Profile In this rapidly evolving IT sector and our dependence on computers in all aspect of our business and the even more dependence on the internet usage, security becomes the vital key in safe guarding our data from pilferage and misuse. There are many software and hardware available in the market to protect our computers and its data but very often the user is not advised correctly from his application stand point, be it in choosing the right Hardware, Software, Networking Etc. Hence we over spend and underutilise and still have very unstable IT Infrastructure susceptible to Data Pilferage and Abuse. Having said that, I have taken it as a challenge to give what the industry needs in terms of investment to returns be it investment in Hardware, Software, Security in data management etc. With this challenge in mind I went on to do my PhD in Information security. And having worked for close to two decade in various large establishments. I have gained a fair amount of understanding on the optimisation and protection of the investment in IT for any business enterprises be it Small Medium or Large. Keeping this challenge in mind me and my team of professional drawn from their respective fields came under this umbrella called HK IT Solutions an end to end IT Solution company providing that cutting edge advantage to our clients in terms of giving our recommendations in setting up or managing the existing IT Infrastructure that would suit their application and budget. Keeping this challenge in mind me and my team of professional drawn from their respective fields came under this umbrella called HK IT Solutions an end to end IT Solution company providing that cutting edge advantage to our clients in terms of giving our recommendations in setting up or managing the existing IT Infrastructure that would suit their application and budget. Optimisation in terms of utility and cost being our fundamental basis to start this organisation, we have our market research team who are in the process of continuously scanning the market and keeping us updated in the latest technologies available and also newer challenges our clients come up with. We share these developments with our clients by way of periodical news letter by e-mail. We have to our credit a very small client base both in India and overseas who are extremely appreciative to our perspective in carrying forward our ambition to optimise and secure their IT Infrastructure. This has helped us in reassuring ourselves that this is what a client in need of. Above all as a policy we share our knowledge with the younger generation by giving them training programmes at the college levels so that they become better IT Professional having a holistic approach. … Dr. THENNARASU.E (HARSHA) PhD (IS) CEO
  • 3. IT Consultancy Services  IT Managed Services  Software Copy rights legal advice  Network Design  Data Center Design  Firewall (Hardware/Software)  ASC (Annual Service Contract)  SAP solutions  Staff Training on Information security  Cyber crimes/ & vulnerabilities  Mailing Solutions  Internet Bandwidth Solutions  IT Inventory Management  Anti Virus & Security Software  IT Outsource  Virtualization (Server/Desktop)  Video Conferencing (Tanburg, Polymer)  Document collaborations (Share Point)  Cost effective solutions on all IT requirement & challenges  Bulk Mailing & Bulk SMS  IT Managed Services  Software Copy rights legal advice  Network Design  Data Center Design  Firewall (Hardware/Software)  ASC (Annual Service Contract)  SAP solutions  Staff Training on Information security  Cyber crimes/ & vulnerabilities  Mailing Solutions  Internet Bandwidth Solutions  IT Inventory Management  Anti Virus & Security Software  IT Outsource  Virtualization (Server/Desktop)  Video Conferencing (Tanburg, Polymer)  Document collaborations (Share Point)  Cost effective solutions on all IT requirement & challenges  Bulk Mailing & Bulk SMS
  • 4. IT Security Audits/ Assessments Methodologies 4 Methodologies
  • 5. Phase 1 Preliminary Review Phase 2 Scope of ISMS Phase 3 GAP Analysis Phase 4 Risk Assessment Phase 5 Risk Mitigation and Selection of Controls Phase 6 Redesign of Security Architecture (Optional) Phase 7 Policy and Procedures Drafting Phase 8 Incident Managemen t 5 Phase 9 Design of BCP/DRP Phase 10 Design of Audit Charter Phase 11 Security Awareness Program Phase 12 Security Metrics Phase 16 Periodic Review (Optional) Phase 15 Certification Phase 14 Internal Audits Phase 13 Implementation of controls (We would provide Guidance)
  • 6. Information Security Assessments Risk Analysis/Gap Analysis/VA/PT & Trainings SOX/ISO/COBIT/HIPAA & Other International Standards Clienteles in India / Overseas
  • 7. Our IT Security Specialists:- Dr. THENNARASU.E (Harsha) PhD Researcher Information Security on High End Applications Information Security Assessment expert Member of DSCI (Data Security Council of India) Trainer Certified Ethical Hacker Overseas Auditing Experience Guest Lecturing (Universities, Colleges) Guest Speaker of Innovating for India Seminar Dr. CHANDRASEKAR UMAPATHY (PhD, IIM) OWASP Chennai Chapter Lead Sri Lanka OWASP Chapter Mentor Invited Trainer at OWASP India conference. Cloud Alliance Security Chennai Chapter Lead. Reviewer of ISACA CRISC Review Manual 2011. Cloud Security Alliance – Control Matrix Co-Author ISACA Best Trainer for the Year 2011-2012 7 Our IT Security Specialists:- Dr. THENNARASU.E (Harsha) PhD Researcher Information Security on High End Applications Information Security Assessment expert Member of DSCI (Data Security Council of India) Trainer Certified Ethical Hacker Overseas Auditing Experience Guest Lecturing (Universities, Colleges) Guest Speaker of Innovating for India Seminar Dr. CHANDRASEKAR UMAPATHY (PhD, IIM) OWASP Chennai Chapter Lead Sri Lanka OWASP Chapter Mentor Invited Trainer at OWASP India conference. Cloud Alliance Security Chennai Chapter Lead. Reviewer of ISACA CRISC Review Manual 2011. Cloud Security Alliance – Control Matrix Co-Author ISACA Best Trainer for the Year 2011-2012
  • 8. Our IT Security Specialists:- Mr. RAJENDRAN Certified CISP from Dept of IT Govt of India Subject matter expert & Trainer for Tamil Nadu Police academic Active member and the Treasurer of Cyber Society of India. Pursuing PhD in the area of Cyber Crime in Banks Member of Indian Society of Victimology 8 Mr. TS. RAGHUNATHAN, Certified security professional by Cisco, Cyberoam, Watchguard, etc., Practitioner Information & Network Security assessments/audits VA/PT specialist Certified Ethical Hacker 12 year experience in Information & Network Security Domains
  • 9. Benefits by IT Assessments/ Audits Restructured Operations aligned with business needs An informed view of organizational security posture First-hand knowledge about organizational security shortcomings in processes and technologies Increase in confidence levels after getting IT Audited/Assessed Understanding of benefits with a proactive approach to IT security Added selling point in offering secured services Increase in customer confidence levels Secure information infrastructure aligned with business needs Justified optimal solutions to provide maximum return on objectives Improved quality of service due to performance optimization 9 Benefits by IT Assessments/ Audits Restructured Operations aligned with business needs An informed view of organizational security posture First-hand knowledge about organizational security shortcomings in processes and technologies Increase in confidence levels after getting IT Audited/Assessed Understanding of benefits with a proactive approach to IT security Added selling point in offering secured services Increase in customer confidence levels Secure information infrastructure aligned with business needs Justified optimal solutions to provide maximum return on objectives Improved quality of service due to performance optimization
  • 11.
  • 12. INNOVATING FOR INDIA SEMINAR @ BISHOP COTTON WOMEN’S CHRISTIAN COLLEGE ADDRESSED BY Dr. HARSHA, Chief IT Security Advisor Information Security Training to Vijay Bank, HO
  • 13. E-waste Collection Program for supporting Senior Citizens CSR Initiative to generate revenue for NGO In partner with Dignity Foundation
  • 14.
  • 15. Articles – Head Consultant
  • 16. Articles – Head Consultant
  • 17. Articles – Head Consultant- Feb’ 2013
  • 18. Clients Partners Thank you IT Consultations @ www.hkit.in