SlideShare a Scribd company logo
1 of 9
IT SECURITY &
RISK MANAGEMENT

         c~Sharpe Security Consulting (cSSC)
                 www.csharpesecurity.com
            contactus@csharpesecurity.com
AGENDA

 Background
 Our Commitment
 Our Services & Solutions
 Our Methodology
 Why Us
 Getting Started!




        Information Assurance|Cyber Security|Compliance|Managed Security Services   2
Background of c~Sharpe Security Consulting
(cSSC)
 IT Security & Risk Management company providing
  information security consulting and managed
  security services
 Launched in 2009
 Headquarters in Connecticut
 Woman-Owned Business
 Delivering services and solutions for both
  commercial businesses and government agencies


         Information Assurance|Cyber Security|Compliance|Managed Security Services   3
Our Commitment

 Over fifteen (15) years of expertise in information security,
  risk management, and program management.

 cSSC works diligently with our clients to ensure the goals of
  the engagement are successfully planned, executed,
  documented, and managed.

 We ensure our clients have an achievable roadmap for
  ongoing compliance, knowledge transfer, and data
  protection.



            Information Assurance|Cyber Security|Compliance|Managed Security Services   4
Our Services & Solutions




        Information Assurance|Cyber Security|Compliance|Managed Security Services   5
Our Methodology
                      A proven approach to identifying, mitigating, and
                       reducing risks to businesses within highly regulated
                       industries. Protecting your company’s data starts
                       with you!

                      Establishing a strong information security posture is
                       not a “One Size Fits All” Solution!

                      We apply our expertise to meet your corporate
                       strategy, while ensuring you have the necessary
                       safeguards to comply with industry standards, federal
                       regulations, and state privacy laws that relate to your
                       business function(s).




       Information Assurance|Cyber Security|Compliance|Managed Security Services   6
Why Us?




 We are an adaptable, flexible, and diligent team with strong work ethics.

 The substantiation of our abilities is shown through the range of information security
  certifications and training attained by are people such as:
     Certified Information Security Manager (CISM)
     Global Information Assurance Certification (GIAC)
     Certified Information System Security Professional (CISSP)
     Certified Ethical Hacker (CEH)
     Computer Hacking Forensic Investigator (CHFI)
     Project Management Professional (PMP)

               Information Assurance|Cyber Security|Compliance|Managed Security Services   7
Getting Started!
 Please contact us TODAY to discuss your needs and establish a
  path of SUCCESS while increasing your SECURITY POSTURE!

                            Contact Us at:
                        Office: 203.572.1428
               Email: contactus@csharpesecurity.com
                     Twitter: @csharpesecurity
             Linkedin: c~Sharpe Security Consulting, LLC




            Information Assurance|Cyber Security|Compliance|Managed Security Services   8
Thank you


Information Assurance|Cyber Security|Compliance|Managed Security Services

More Related Content

What's hot

Six Key Components to Achieving GDPR Security Requirements
Six Key Components to Achieving GDPR Security RequirementsSix Key Components to Achieving GDPR Security Requirements
Six Key Components to Achieving GDPR Security RequirementsJeff Katanick
 
Global Cybersecurity Consulting Firm
Global Cybersecurity Consulting FirmGlobal Cybersecurity Consulting Firm
Global Cybersecurity Consulting Firmwilsonconsulting1
 
Hackproof for Healthcare
Hackproof for HealthcareHackproof for Healthcare
Hackproof for Healthcarehackproof12
 
Best cybersecurity services for organizations
Best cybersecurity services for organizationsBest cybersecurity services for organizations
Best cybersecurity services for organizationswilsonconsulting1
 
Sec_360_Capability_Statement
Sec_360_Capability_StatementSec_360_Capability_Statement
Sec_360_Capability_StatementRandy B.
 
Le soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPRLe soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPRJürgen Ambrosi
 
Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015patmisasi
 
Comply or Die: Learn How to Avoid Failed Audits
Comply or Die: Learn How to Avoid Failed AuditsComply or Die: Learn How to Avoid Failed Audits
Comply or Die: Learn How to Avoid Failed AuditsThycotic
 
Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEOKevin Duffey
 
FireEye investis case study
FireEye investis case studyFireEye investis case study
FireEye investis case studycnnetwork
 
DFARS compliance
DFARS complianceDFARS compliance
DFARS complianceLinqsGroup
 
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCapgemini
 
Be Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crimeBe Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crimeKevin Duffey
 
FRSecure Company Overview
FRSecure Company OverviewFRSecure Company Overview
FRSecure Company Overviewstevemarsden
 

What's hot (17)

Six Key Components to Achieving GDPR Security Requirements
Six Key Components to Achieving GDPR Security RequirementsSix Key Components to Achieving GDPR Security Requirements
Six Key Components to Achieving GDPR Security Requirements
 
Global Cybersecurity Consulting Firm
Global Cybersecurity Consulting FirmGlobal Cybersecurity Consulting Firm
Global Cybersecurity Consulting Firm
 
Hackproof for Healthcare
Hackproof for HealthcareHackproof for Healthcare
Hackproof for Healthcare
 
Wilson Consulting Group
Wilson Consulting GroupWilson Consulting Group
Wilson Consulting Group
 
Conquest Security Capabilities
Conquest Security CapabilitiesConquest Security Capabilities
Conquest Security Capabilities
 
Best cybersecurity services for organizations
Best cybersecurity services for organizationsBest cybersecurity services for organizations
Best cybersecurity services for organizations
 
Sec_360_Capability_Statement
Sec_360_Capability_StatementSec_360_Capability_Statement
Sec_360_Capability_Statement
 
Le soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPRLe soluzioni tecnologiche a supporto della normativa GDPR
Le soluzioni tecnologiche a supporto della normativa GDPR
 
Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015Scalar_Security_Overview October 2015
Scalar_Security_Overview October 2015
 
Comply or Die: Learn How to Avoid Failed Audits
Comply or Die: Learn How to Avoid Failed AuditsComply or Die: Learn How to Avoid Failed Audits
Comply or Die: Learn How to Avoid Failed Audits
 
Cyber security infotech profile
Cyber security infotech profileCyber security infotech profile
Cyber security infotech profile
 
Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEO
 
FireEye investis case study
FireEye investis case studyFireEye investis case study
FireEye investis case study
 
DFARS compliance
DFARS complianceDFARS compliance
DFARS compliance
 
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trust
 
Be Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crimeBe Angry - why CEOs should join the coalition against cyber crime
Be Angry - why CEOs should join the coalition against cyber crime
 
FRSecure Company Overview
FRSecure Company OverviewFRSecure Company Overview
FRSecure Company Overview
 

Similar to c~Sharpe Security Services

Welcome to the World of the BPS Security Practice
Welcome to the World of the BPS Security PracticeWelcome to the World of the BPS Security Practice
Welcome to the World of the BPS Security PracticeEdwin Soares
 
Cleared Job Fair Job Seeker Handbook March 7, BWI, MD
Cleared Job Fair Job Seeker Handbook March 7, BWI, MDCleared Job Fair Job Seeker Handbook March 7, BWI, MD
Cleared Job Fair Job Seeker Handbook March 7, BWI, MDClearedJobs.Net
 
Adp global security trust the platform for business innovation
Adp global security   trust the platform for business innovationAdp global security   trust the platform for business innovation
Adp global security trust the platform for business innovationNathan Gazzard
 
Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415Kevin Hosey
 
Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...Securium Solutions
 
SECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security CompanySECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security Companykeshavsecurium
 
Best Vapt Security Company Securium Solu
Best Vapt Security Company Securium SoluBest Vapt Security Company Securium Solu
Best Vapt Security Company Securium Solukeshavsecurium
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting OverviewRonan Martin
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
VAPT Services | Securium Solutions
VAPT Services | Securium SolutionsVAPT Services | Securium Solutions
VAPT Services | Securium SolutionsSecurium solutions
 
NQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA
 
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersBlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersMighty Guides, Inc.
 
Company Profile Zindagi Technologies
Company Profile Zindagi TechnologiesCompany Profile Zindagi Technologies
Company Profile Zindagi TechnologiesZindagitechnologies
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier AGC Networks Ltd
 
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...Falgun Rathod
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System SecurityCSSRL PUNE
 

Similar to c~Sharpe Security Services (20)

Welcome to the World of the BPS Security Practice
Welcome to the World of the BPS Security PracticeWelcome to the World of the BPS Security Practice
Welcome to the World of the BPS Security Practice
 
Cleared Job Fair Job Seeker Handbook March 7, BWI, MD
Cleared Job Fair Job Seeker Handbook March 7, BWI, MDCleared Job Fair Job Seeker Handbook March 7, BWI, MD
Cleared Job Fair Job Seeker Handbook March 7, BWI, MD
 
Adp global security trust the platform for business innovation
Adp global security   trust the platform for business innovationAdp global security   trust the platform for business innovation
Adp global security trust the platform for business innovation
 
Skillmine CISO as service
Skillmine CISO as serviceSkillmine CISO as service
Skillmine CISO as service
 
Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415
 
Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...Securium Solutions: Empowering Online Certification Training in Cyber Securit...
Securium Solutions: Empowering Online Certification Training in Cyber Securit...
 
Securim Solutions Pvt Ltd
Securim Solutions Pvt LtdSecurim Solutions Pvt Ltd
Securim Solutions Pvt Ltd
 
SECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security CompanySECURIUM-SOLUTIONS Best VAPT Security Company
SECURIUM-SOLUTIONS Best VAPT Security Company
 
Best Vapt Security Company Securium Solu
Best Vapt Security Company Securium SoluBest Vapt Security Company Securium Solu
Best Vapt Security Company Securium Solu
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting Overview
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
VAPT Services | Securium Solutions
VAPT Services | Securium SolutionsVAPT Services | Securium Solutions
VAPT Services | Securium Solutions
 
NQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA Your Risk Assurance Partner
NQA Your Risk Assurance Partner
 
Trofi Security Service Catalogue (1)
Trofi Security Service Catalogue (1)Trofi Security Service Catalogue (1)
Trofi Security Service Catalogue (1)
 
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersBlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
 
Company Profile Zindagi Technologies
Company Profile Zindagi TechnologiesCompany Profile Zindagi Technologies
Company Profile Zindagi Technologies
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier
 
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System Security
 
How to Represent the Services That You Provide
How to Represent the Services That You ProvideHow to Represent the Services That You Provide
How to Represent the Services That You Provide
 

c~Sharpe Security Services

  • 1. IT SECURITY & RISK MANAGEMENT c~Sharpe Security Consulting (cSSC) www.csharpesecurity.com contactus@csharpesecurity.com
  • 2. AGENDA  Background  Our Commitment  Our Services & Solutions  Our Methodology  Why Us  Getting Started! Information Assurance|Cyber Security|Compliance|Managed Security Services 2
  • 3. Background of c~Sharpe Security Consulting (cSSC)  IT Security & Risk Management company providing information security consulting and managed security services  Launched in 2009  Headquarters in Connecticut  Woman-Owned Business  Delivering services and solutions for both commercial businesses and government agencies Information Assurance|Cyber Security|Compliance|Managed Security Services 3
  • 4. Our Commitment  Over fifteen (15) years of expertise in information security, risk management, and program management.  cSSC works diligently with our clients to ensure the goals of the engagement are successfully planned, executed, documented, and managed.  We ensure our clients have an achievable roadmap for ongoing compliance, knowledge transfer, and data protection. Information Assurance|Cyber Security|Compliance|Managed Security Services 4
  • 5. Our Services & Solutions Information Assurance|Cyber Security|Compliance|Managed Security Services 5
  • 6. Our Methodology  A proven approach to identifying, mitigating, and reducing risks to businesses within highly regulated industries. Protecting your company’s data starts with you!  Establishing a strong information security posture is not a “One Size Fits All” Solution!  We apply our expertise to meet your corporate strategy, while ensuring you have the necessary safeguards to comply with industry standards, federal regulations, and state privacy laws that relate to your business function(s). Information Assurance|Cyber Security|Compliance|Managed Security Services 6
  • 7. Why Us?  We are an adaptable, flexible, and diligent team with strong work ethics.  The substantiation of our abilities is shown through the range of information security certifications and training attained by are people such as:  Certified Information Security Manager (CISM)  Global Information Assurance Certification (GIAC)  Certified Information System Security Professional (CISSP)  Certified Ethical Hacker (CEH)  Computer Hacking Forensic Investigator (CHFI)  Project Management Professional (PMP) Information Assurance|Cyber Security|Compliance|Managed Security Services 7
  • 8. Getting Started!  Please contact us TODAY to discuss your needs and establish a path of SUCCESS while increasing your SECURITY POSTURE! Contact Us at: Office: 203.572.1428 Email: contactus@csharpesecurity.com Twitter: @csharpesecurity Linkedin: c~Sharpe Security Consulting, LLC Information Assurance|Cyber Security|Compliance|Managed Security Services 8
  • 9. Thank you Information Assurance|Cyber Security|Compliance|Managed Security Services