SlideShare a Scribd company logo
YOU
have....
have.

Installed
Firewalls,

Data Leakage, Spam, etc
Solutions

and Competent
IT Teams
*Is your BUSINESS SAFE?
Are you aware of Risks?
Why should you *consider Us for?
Information Security Risk Assessment,
IT Audit, Network Security Reviews,
ERP and CBS Review
1 Qualified and professional team with up to 30 years of experience having CISA, CISM,
CGEIT, CA, DISA, CCNA, ISO27001 certifications
2 Team lead, security consultants have hands-on software development,
implementation, Networking, IT operations and security implementation experience
3 Our solutions are honest, unbiased, practical, cost saving, vendor or product
independent
4 Our recommendations focus on enhanced IT Maturity including IT Management,
procedural and Technical solutions
5 We DO NOT push unnecessary time and cost intensive Certifications such as
ISO27001, ITIL, ISO22301 etc or Security products and Solutions such as UTM, L3,
etc
6 Our efficient IT Risk review assignments
-are of short duration
-use clear, crisp and relevant standards, guidelines
-are economical and within acceptable budgets
-are aligned to Business Objectives
7 Satisfied customers across the globe including NGO, UN, Govt, Media, Banking,
Insurance, Manufacturing, Software / IT sectors
Thank you, please contact
Name

Sanjiv Arora

Email

sa@tech-controls.com

Web

www.tech-controls.com

Cell

+91 9810293733

Location

New Delhi / India

Servicing

India and the world

More Related Content

What's hot

IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
Community IT Innovators
 
Community IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security Policy
Community IT Innovators
 
Chapter 1 Security Framework
Chapter 1   Security FrameworkChapter 1   Security Framework
Chapter 1 Security Framework
Karthikeyan Dhayalan
 
Cognizant EBA-ERSS
Cognizant EBA-ERSSCognizant EBA-ERSS
Cognizant EBA-ERSS
Nitin Sharma
 
HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slides
projectwinner
 
Technical Services eBook
Technical Services eBookTechnical Services eBook
Technical Services eBook
Ideba
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
Erik Taavila
 

What's hot (7)

IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
 
Community IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security Policy
 
Chapter 1 Security Framework
Chapter 1   Security FrameworkChapter 1   Security Framework
Chapter 1 Security Framework
 
Cognizant EBA-ERSS
Cognizant EBA-ERSSCognizant EBA-ERSS
Cognizant EBA-ERSS
 
HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slides
 
Technical Services eBook
Technical Services eBookTechnical Services eBook
Technical Services eBook
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 

Viewers also liked

Candidiasis invasiva
Candidiasis invasivaCandidiasis invasiva
Candidiasis invasiva
Alex Castañeda-Sabogal
 
KAP_entrega_gaia
KAP_entrega_gaiaKAP_entrega_gaia
KAP_entrega_gaia
kontrabentana
 
ACSI LEARNING TEAMS 10-2010
ACSI LEARNING TEAMS 10-2010ACSI LEARNING TEAMS 10-2010
ACSI LEARNING TEAMS 10-2010
NNU
 
3.Innova Oba
3.Innova Oba3.Innova Oba
3.Innova ObaErmando
 
Geotrails
GeotrailsGeotrails
What Happened From 1767 Until Now In The
What  Happened From 1767 Until Now In TheWhat  Happened From 1767 Until Now In The
What Happened From 1767 Until Now In The
h20ho
 
【佐賀大学】平成21年環境報告書
【佐賀大学】平成21年環境報告書【佐賀大学】平成21年環境報告書
【佐賀大学】平成21年環境報告書env49
 
mobipoll @ РИФ+КИБ
mobipoll @ РИФ+КИБmobipoll @ РИФ+КИБ
mobipoll @ РИФ+КИБ
Anton Kuchumov
 
Taking Flight: an abbreviated version of my Agile DC talk
Taking Flight: an abbreviated version of my Agile DC talkTaking Flight: an abbreviated version of my Agile DC talk
Taking Flight: an abbreviated version of my Agile DC talk
Paul Boos
 
1.Innova Zurich
1.Innova Zurich1.Innova Zurich
1.Innova ZurichErmando
 
Creating A Positive Classroom Environment 1192954359997023 3
Creating A Positive Classroom Environment 1192954359997023 3Creating A Positive Classroom Environment 1192954359997023 3
Creating A Positive Classroom Environment 1192954359997023 3smszyco
 
Roi Xuong Gieng
Roi Xuong GiengRoi Xuong Gieng
Roi Xuong Giengbienluu
 
10. pengolahan lumpur_di_bpam
10. pengolahan lumpur_di_bpam10. pengolahan lumpur_di_bpam
10. pengolahan lumpur_di_bpamnyomankurniawan
 
Dive into greasemonkey (español)
Dive into greasemonkey (español)Dive into greasemonkey (español)
Dive into greasemonkey (español)
guest89b13c
 
Trial Scheme On School Drug
Trial Scheme On School DrugTrial Scheme On School Drug
Trial Scheme On School Druglamkinyan
 
6.Uretim Dagitim 16.40 17.10 Urun Gelistirmede
6.Uretim Dagitim 16.40 17.10 Urun Gelistirmede6.Uretim Dagitim 16.40 17.10 Urun Gelistirmede
6.Uretim Dagitim 16.40 17.10 Urun GelistirmedeErmando
 

Viewers also liked (20)

Candidiasis invasiva
Candidiasis invasivaCandidiasis invasiva
Candidiasis invasiva
 
KAP_entrega_gaia
KAP_entrega_gaiaKAP_entrega_gaia
KAP_entrega_gaia
 
ACSI LEARNING TEAMS 10-2010
ACSI LEARNING TEAMS 10-2010ACSI LEARNING TEAMS 10-2010
ACSI LEARNING TEAMS 10-2010
 
Web2.0 part2
Web2.0 part2Web2.0 part2
Web2.0 part2
 
3.Innova Oba
3.Innova Oba3.Innova Oba
3.Innova Oba
 
Geotrails
GeotrailsGeotrails
Geotrails
 
What Happened From 1767 Until Now In The
What  Happened From 1767 Until Now In TheWhat  Happened From 1767 Until Now In The
What Happened From 1767 Until Now In The
 
Save antarctica
Save antarcticaSave antarctica
Save antarctica
 
【佐賀大学】平成21年環境報告書
【佐賀大学】平成21年環境報告書【佐賀大学】平成21年環境報告書
【佐賀大学】平成21年環境報告書
 
mobipoll @ РИФ+КИБ
mobipoll @ РИФ+КИБmobipoll @ РИФ+КИБ
mobipoll @ РИФ+КИБ
 
Taking Flight: an abbreviated version of my Agile DC talk
Taking Flight: an abbreviated version of my Agile DC talkTaking Flight: an abbreviated version of my Agile DC talk
Taking Flight: an abbreviated version of my Agile DC talk
 
Cucumber
CucumberCucumber
Cucumber
 
1.Innova Zurich
1.Innova Zurich1.Innova Zurich
1.Innova Zurich
 
Creating A Positive Classroom Environment 1192954359997023 3
Creating A Positive Classroom Environment 1192954359997023 3Creating A Positive Classroom Environment 1192954359997023 3
Creating A Positive Classroom Environment 1192954359997023 3
 
Roi Xuong Gieng
Roi Xuong GiengRoi Xuong Gieng
Roi Xuong Gieng
 
10. pengolahan lumpur_di_bpam
10. pengolahan lumpur_di_bpam10. pengolahan lumpur_di_bpam
10. pengolahan lumpur_di_bpam
 
Dive into greasemonkey (español)
Dive into greasemonkey (español)Dive into greasemonkey (español)
Dive into greasemonkey (español)
 
Trial Scheme On School Drug
Trial Scheme On School DrugTrial Scheme On School Drug
Trial Scheme On School Drug
 
6.Uretim Dagitim 16.40 17.10 Urun Gelistirmede
6.Uretim Dagitim 16.40 17.10 Urun Gelistirmede6.Uretim Dagitim 16.40 17.10 Urun Gelistirmede
6.Uretim Dagitim 16.40 17.10 Urun Gelistirmede
 
Bootchart 송형주
Bootchart 송형주Bootchart 송형주
Bootchart 송형주
 

Similar to Are u safe1

IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough
 
Technical Security and Penetration Testing
Technical Security and Penetration TestingTechnical Security and Penetration Testing
Technical Security and Penetration TestingIT Governance Ltd
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
William McBorrough
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting OverviewRonan Martin
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 
NQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA Your Risk Assurance Partner
NQA Your Risk Assurance Partner
NQA
 
Resume-Amit 1.0
Resume-Amit 1.0Resume-Amit 1.0
Resume-Amit 1.0Amit Verma
 
GPS - Corporate Overview
GPS - Corporate OverviewGPS - Corporate Overview
GPS - Corporate OverviewTawnia Beckwith
 
Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415Kevin Hosey
 
2st Corporate Overview
2st Corporate Overview2st Corporate Overview
2st Corporate OverviewKarenLV
 
Skillmine CISO as service
Skillmine CISO as serviceSkillmine CISO as service
Skillmine CISO as service
Skillmine Technology Consulting
 
G4S Security Services - Company Profile G4S
G4S Security Services - Company Profile G4SG4S Security Services - Company Profile G4S
G4S Security Services - Company Profile G4SIrfan Yunizar
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your Job
Priyanka Aash
 
ITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet ENITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet EN
ITrust - Cybersecurity as a Service
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
360 BSI
 
How to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationHow to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical Information
Koenig Solutions Ltd.
 

Similar to Are u safe1 (20)

IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Technical Security and Penetration Testing
Technical Security and Penetration TestingTechnical Security and Penetration Testing
Technical Security and Penetration Testing
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting Overview
 
Confidis-Briefing-Web
Confidis-Briefing-WebConfidis-Briefing-Web
Confidis-Briefing-Web
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
NQA Your Risk Assurance Partner
NQA Your Risk Assurance PartnerNQA Your Risk Assurance Partner
NQA Your Risk Assurance Partner
 
Resume-Amit 1.0
Resume-Amit 1.0Resume-Amit 1.0
Resume-Amit 1.0
 
GPS - Corporate Overview
GPS - Corporate OverviewGPS - Corporate Overview
GPS - Corporate Overview
 
Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415
 
2st Corporate Overview
2st Corporate Overview2st Corporate Overview
2st Corporate Overview
 
RCN - Company Profile
RCN - Company ProfileRCN - Company Profile
RCN - Company Profile
 
CV_Anil K Dubey V1.1
CV_Anil K Dubey V1.1CV_Anil K Dubey V1.1
CV_Anil K Dubey V1.1
 
Skillmine CISO as service
Skillmine CISO as serviceSkillmine CISO as service
Skillmine CISO as service
 
G4S Security Services - Company Profile G4S
G4S Security Services - Company Profile G4SG4S Security Services - Company Profile G4S
G4S Security Services - Company Profile G4S
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your Job
 
ITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet ENITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet EN
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
 
How to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationHow to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical Information
 

Recently uploaded

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Are u safe1

  • 1. YOU have.... have. Installed Firewalls, Data Leakage, Spam, etc Solutions and Competent IT Teams *Is your BUSINESS SAFE? Are you aware of Risks?
  • 2. Why should you *consider Us for? Information Security Risk Assessment, IT Audit, Network Security Reviews, ERP and CBS Review 1 Qualified and professional team with up to 30 years of experience having CISA, CISM, CGEIT, CA, DISA, CCNA, ISO27001 certifications 2 Team lead, security consultants have hands-on software development, implementation, Networking, IT operations and security implementation experience 3 Our solutions are honest, unbiased, practical, cost saving, vendor or product independent 4 Our recommendations focus on enhanced IT Maturity including IT Management, procedural and Technical solutions 5 We DO NOT push unnecessary time and cost intensive Certifications such as ISO27001, ITIL, ISO22301 etc or Security products and Solutions such as UTM, L3, etc 6 Our efficient IT Risk review assignments -are of short duration -use clear, crisp and relevant standards, guidelines -are economical and within acceptable budgets -are aligned to Business Objectives 7 Satisfied customers across the globe including NGO, UN, Govt, Media, Banking, Insurance, Manufacturing, Software / IT sectors
  • 3. Thank you, please contact Name Sanjiv Arora Email sa@tech-controls.com Web www.tech-controls.com Cell +91 9810293733 Location New Delhi / India Servicing India and the world