SlideShare a Scribd company logo
1 of 2
Download to read offline
Skillmine
Technology Consulting Services
CISO as-a-Service
CISOaas
The Approach
Information & IT Security Services is one of the niche and core expertise of Skillmine.
The main objective of CISO-as-a-Service is to enable our Customers for Information Security Assurance in line with
regulatory compliance of ISO, PCI, HIPAA, GDPR, SAMA CSF, etc.
These in-depth services help organisations to identify their current information security maturity and the threat
landscape. This will help to understand what needs to be protected and the level of protection required. CISO as a
service delivers the Information Security Strategy, Roadmap, Advisory and Execution of Technical Services. It will
ensure that the basics are implemented and maintained, risks are reduced and the maturity of Information Security is
raised.
Competence from a pool of experts with industry standard expertise
Precision and focus with a dedicated onsite security consultant
1. ASSESSMENT
Asset Management
Business Environment
Gap Analysis
Risk Assessment
2. MITIGATION
& PROTECTION
Risk Management
Governance & Compliance
Data Security
Cyber Security
Network Security
End-Point Security
3. IMPLEMENT
& MONITOR
Implement Security Framework
Security Tools
Integrate Key Tools and Systems
Detection Process
Security Continuous Monitoring
Threat Hunting
Vulnerabilty Management
4. MAINTAIN & AUDIT
Recovery Planning
Continuous Improvements
Framework
CISO as a Service - Coverage
The Team
CISO–Key 4 Facets
Strategy Advisory Technology
Integration
Protection
With key focus on business
objectives and envision
security strategy in line with
organization’s mission,
manage risk, establish
security framework and
regulatory compliance with
valued investments on
technology, security
operations and viable
solutions.
Integrate with the business
strategy and operations,
educate, advise, and
cyber risk implications.
Regular advisories to
business leadership and
security recommendations to
technology leadership.
Select and implement
security solutions and tight
integration with each other
and ITSM solutions to cover
entire Defense in Depth
establishing a seamless
framework.
Understand threat
landscape, protect business
assets and effective cyber
risk program. Safeguard
Enterprise & Endpoint IT
Infrastructure. Maintain the
availability of data and drive
the overall security
programme.
Refine Information
Security Strategy
IT Security
Operations
Business Continuity
Management
Continuous
Improvement
Governance, Risk
and Compliance
IT Security
For more info
skill-mine.com
India | KSA | UK | USA
Follow Us on
For any queries
info@skill-mine.com
http://bit.ly/2mkMsEA http://bit.ly/2mg6rnJ http://bit.ly/2oAoDt9
http://bit.ly/2mgE0pL http://bit.ly/2n39d04 http://bit.ly/2u9yNnJ
Anant Agrawal
Managing Director
23 years of experience in IT Strategy, IT Infrastructure,
InformationSecurity, IT Operations, Capability
Augmentation, and Digital Transformation. He held
elite positions at Retail & Financial enterprises before
becoming an Entrepreneur.
Anupam Joshi
Senior Manager, Information Security
Overall 10+ years of experience in managing and
deliveringoperations in IT security operations Center
(SOC). Certified for MCSD, MCSE, MCAD, ETH, CCNA,
CCIE, CCSP, CISM, CCI, DCL, AWS certified Security
Specialist & ITILv4. Shares a work experience of more
than a decade in fortune 500 organisations in India.
A Certified Lead Auditor for ISMS- ISO 27001:2013 and
QMS-9001:2008 with a proven track record of system
implementation, training, auditing, risk assessment,
compliance & governance with global clients with 13yrs
experience.
Mohsin Margoob
AVP - Cybersecurity & Governance
Khandesha Kothale
AVP - Information Security
Khandesha holds an experience over 11years with
proven ability into IT Network & Security Infrastructure
Solution, Design, budget planning, NOC specially for
Manufacturing, Finance, Supply Management & IT
Service Sector along with Nessus, Cyber Security,
AWS Cloud Security.
CISA & ECIH Certified, have 14 years of experience in
Cyber Securiy, IT Security Audits, Data Centre Audits,
EMS Audits, Supply Chain Security Audits, SOC, IT Infra
Management.
Sandeep Sharma
Senior Manager, Information Security & GRC
Vaibhav Garg
Sr. Architect IT
Vaibhav has 10+ years of experience in Information
Security, Cloud Security (AWS/Azure), Network Security,
End Point Security (EDR-Crowd Strike), GRC, Application
Security, Data Protection (DLP/O365/SharePoint/CASB),
Data Privacy, Risk Mgmt., SOC.

More Related Content

Similar to CISO as a Service - Skillmine Technology Consulting Services

IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxinfosec train
 
NQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSOSagarNegi10
 
Yhcg - IT security and risk management
Yhcg  - IT security and risk managementYhcg  - IT security and risk management
Yhcg - IT security and risk managementWilfred Barretto
 
YHCG - IT Security and Risk Management
YHCG - IT Security and Risk ManagementYHCG - IT Security and Risk Management
YHCG - IT Security and Risk ManagementWilfred Barretto
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE360 BSI
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesKroll
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting OverviewRonan Martin
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOSagarNegi10
 
Manufacturing in the Digital Age - Securing Your Business with Effective IT a...
Manufacturing in the Digital Age - Securing Your Business with Effective IT a...Manufacturing in the Digital Age - Securing Your Business with Effective IT a...
Manufacturing in the Digital Age - Securing Your Business with Effective IT a...CareMIT Pty Ltd
 
Corporate Security Intelligence Just Got Smarter All Courses Linkedin
Corporate Security Intelligence Just Got Smarter   All Courses   LinkedinCorporate Security Intelligence Just Got Smarter   All Courses   Linkedin
Corporate Security Intelligence Just Got Smarter All Courses LinkedinSteve Phelps
 
India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021InsightsSuccess3
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec trainInfosecTrain
 

Similar to CISO as a Service - Skillmine Technology Consulting Services (20)

IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
 
Infoprive Brochure
Infoprive Brochure Infoprive Brochure
Infoprive Brochure
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
NQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA Your Risk Assurance Partner
NQA Your Risk Assurance Partner
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
S Rod Simpson Resume
S Rod Simpson ResumeS Rod Simpson Resume
S Rod Simpson Resume
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 
Yhcg - IT security and risk management
Yhcg  - IT security and risk managementYhcg  - IT security and risk management
Yhcg - IT security and risk management
 
YHCG - IT Security and Risk Management
YHCG - IT Security and Risk ManagementYHCG - IT Security and Risk Management
YHCG - IT Security and Risk Management
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting Overview
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consulting
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
 
Manufacturing in the Digital Age - Securing Your Business with Effective IT a...
Manufacturing in the Digital Age - Securing Your Business with Effective IT a...Manufacturing in the Digital Age - Securing Your Business with Effective IT a...
Manufacturing in the Digital Age - Securing Your Business with Effective IT a...
 
Corporate Security Intelligence Just Got Smarter All Courses Linkedin
Corporate Security Intelligence Just Got Smarter   All Courses   LinkedinCorporate Security Intelligence Just Got Smarter   All Courses   Linkedin
Corporate Security Intelligence Just Got Smarter All Courses Linkedin
 
India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021India's most trusted enterprise security solution providers 2021
India's most trusted enterprise security solution providers 2021
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 

More from Skillmine Technology Consulting

SAP Managed Services Best Practices and Implementation Strategies
SAP Managed Services Best Practices and Implementation StrategiesSAP Managed Services Best Practices and Implementation Strategies
SAP Managed Services Best Practices and Implementation StrategiesSkillmine Technology Consulting
 
Unlocking Opportunities on the Cloud Through Container Technology.pdf
Unlocking Opportunities on the Cloud Through Container Technology.pdfUnlocking Opportunities on the Cloud Through Container Technology.pdf
Unlocking Opportunities on the Cloud Through Container Technology.pdfSkillmine Technology Consulting
 

More from Skillmine Technology Consulting (20)

SAP Managed Services Best Practices and Implementation Strategies
SAP Managed Services Best Practices and Implementation StrategiesSAP Managed Services Best Practices and Implementation Strategies
SAP Managed Services Best Practices and Implementation Strategies
 
Microservices and Enterprise App Development
Microservices and Enterprise App DevelopmentMicroservices and Enterprise App Development
Microservices and Enterprise App Development
 
Microservices and Enterprise App Development.pdf
Microservices and Enterprise App Development.pdfMicroservices and Enterprise App Development.pdf
Microservices and Enterprise App Development.pdf
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
Unlocking Opportunities on the Cloud Through Container Technology.pdf
Unlocking Opportunities on the Cloud Through Container Technology.pdfUnlocking Opportunities on the Cloud Through Container Technology.pdf
Unlocking Opportunities on the Cloud Through Container Technology.pdf
 
5 Reasons Why Datafication is The Future of Businesss
5 Reasons Why Datafication is The Future of Businesss5 Reasons Why Datafication is The Future of Businesss
5 Reasons Why Datafication is The Future of Businesss
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
Skillmine - Corporate Profile v2 2023.pdf
Skillmine - Corporate Profile v2 2023.pdfSkillmine - Corporate Profile v2 2023.pdf
Skillmine - Corporate Profile v2 2023.pdf
 
Information Security Statutory Compliance
Information Security Statutory ComplianceInformation Security Statutory Compliance
Information Security Statutory Compliance
 
Network Operation Center
Network Operation CenterNetwork Operation Center
Network Operation Center
 
Skillmine-InfoSecurity-VAPT-V.2.
Skillmine-InfoSecurity-VAPT-V.2.Skillmine-InfoSecurity-VAPT-V.2.
Skillmine-InfoSecurity-VAPT-V.2.
 
BUSINESS CONTINUITY MANAGEMENT
BUSINESS CONTINUITY MANAGEMENTBUSINESS CONTINUITY MANAGEMENT
BUSINESS CONTINUITY MANAGEMENT
 
IT Infrastrucure Technology Transformation
IT Infrastrucure Technology TransformationIT Infrastrucure Technology Transformation
IT Infrastrucure Technology Transformation
 
MANAGED IT SERVICES
MANAGED IT SERVICESMANAGED IT SERVICES
MANAGED IT SERVICES
 
A Guide To IT Compliance Assessment And Management
A Guide To IT Compliance Assessment And ManagementA Guide To IT Compliance Assessment And Management
A Guide To IT Compliance Assessment And Management
 
Skillmine IT Service Management
Skillmine IT Service ManagementSkillmine IT Service Management
Skillmine IT Service Management
 
IT CLOUD SECURITY
IT CLOUD SECURITYIT CLOUD SECURITY
IT CLOUD SECURITY
 
IT INFRASTRUCTURE SERVICES
IT INFRASTRUCTURE SERVICESIT INFRASTRUCTURE SERVICES
IT INFRASTRUCTURE SERVICES
 
Enterprise Application Development
Enterprise Application DevelopmentEnterprise Application Development
Enterprise Application Development
 
Capability Addition
Capability AdditionCapability Addition
Capability Addition
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

CISO as a Service - Skillmine Technology Consulting Services

  • 1. Skillmine Technology Consulting Services CISO as-a-Service CISOaas The Approach Information & IT Security Services is one of the niche and core expertise of Skillmine. The main objective of CISO-as-a-Service is to enable our Customers for Information Security Assurance in line with regulatory compliance of ISO, PCI, HIPAA, GDPR, SAMA CSF, etc. These in-depth services help organisations to identify their current information security maturity and the threat landscape. This will help to understand what needs to be protected and the level of protection required. CISO as a service delivers the Information Security Strategy, Roadmap, Advisory and Execution of Technical Services. It will ensure that the basics are implemented and maintained, risks are reduced and the maturity of Information Security is raised. Competence from a pool of experts with industry standard expertise Precision and focus with a dedicated onsite security consultant 1. ASSESSMENT Asset Management Business Environment Gap Analysis Risk Assessment 2. MITIGATION & PROTECTION Risk Management Governance & Compliance Data Security Cyber Security Network Security End-Point Security 3. IMPLEMENT & MONITOR Implement Security Framework Security Tools Integrate Key Tools and Systems Detection Process Security Continuous Monitoring Threat Hunting Vulnerabilty Management 4. MAINTAIN & AUDIT Recovery Planning Continuous Improvements Framework
  • 2. CISO as a Service - Coverage The Team CISO–Key 4 Facets Strategy Advisory Technology Integration Protection With key focus on business objectives and envision security strategy in line with organization’s mission, manage risk, establish security framework and regulatory compliance with valued investments on technology, security operations and viable solutions. Integrate with the business strategy and operations, educate, advise, and cyber risk implications. Regular advisories to business leadership and security recommendations to technology leadership. Select and implement security solutions and tight integration with each other and ITSM solutions to cover entire Defense in Depth establishing a seamless framework. Understand threat landscape, protect business assets and effective cyber risk program. Safeguard Enterprise & Endpoint IT Infrastructure. Maintain the availability of data and drive the overall security programme. Refine Information Security Strategy IT Security Operations Business Continuity Management Continuous Improvement Governance, Risk and Compliance IT Security For more info skill-mine.com India | KSA | UK | USA Follow Us on For any queries info@skill-mine.com http://bit.ly/2mkMsEA http://bit.ly/2mg6rnJ http://bit.ly/2oAoDt9 http://bit.ly/2mgE0pL http://bit.ly/2n39d04 http://bit.ly/2u9yNnJ Anant Agrawal Managing Director 23 years of experience in IT Strategy, IT Infrastructure, InformationSecurity, IT Operations, Capability Augmentation, and Digital Transformation. He held elite positions at Retail & Financial enterprises before becoming an Entrepreneur. Anupam Joshi Senior Manager, Information Security Overall 10+ years of experience in managing and deliveringoperations in IT security operations Center (SOC). Certified for MCSD, MCSE, MCAD, ETH, CCNA, CCIE, CCSP, CISM, CCI, DCL, AWS certified Security Specialist & ITILv4. Shares a work experience of more than a decade in fortune 500 organisations in India. A Certified Lead Auditor for ISMS- ISO 27001:2013 and QMS-9001:2008 with a proven track record of system implementation, training, auditing, risk assessment, compliance & governance with global clients with 13yrs experience. Mohsin Margoob AVP - Cybersecurity & Governance Khandesha Kothale AVP - Information Security Khandesha holds an experience over 11years with proven ability into IT Network & Security Infrastructure Solution, Design, budget planning, NOC specially for Manufacturing, Finance, Supply Management & IT Service Sector along with Nessus, Cyber Security, AWS Cloud Security. CISA & ECIH Certified, have 14 years of experience in Cyber Securiy, IT Security Audits, Data Centre Audits, EMS Audits, Supply Chain Security Audits, SOC, IT Infra Management. Sandeep Sharma Senior Manager, Information Security & GRC Vaibhav Garg Sr. Architect IT Vaibhav has 10+ years of experience in Information Security, Cloud Security (AWS/Azure), Network Security, End Point Security (EDR-Crowd Strike), GRC, Application Security, Data Protection (DLP/O365/SharePoint/CASB), Data Privacy, Risk Mgmt., SOC.