SlideShare a Scribd company logo
Background

I

nfoprive is a core Business Information Security Company
with strong competence in the development and management
of information security services covering advisory, program
development, program management and compliance. We deliver
and maintain trusted and enabling Information services and solutions
for our clients giving them the confidence to focus on their core
business objectives and operations knowing that the security and
resilience of the information capital that drives their business
operations is assured.

Vision and Mission
Vision

• To be the foremost client–driven organization
that provides quality and focused information
services to enable business growth

Mission

• To deliver cost effective services and solutions
that provide value.

Our Approach

Our value proposition is to deliver a suite of business
information services that help our clients achieve the
reliability, integrity, confidentiality and resilience of
their information capital.
The fulfillment of our client’s business objectives is
very important to us and we ensure that our clients
derive maximum value and satisfaction from our
services and solutions through the application of
our action framework to our client needs
Our Action Cycle
Our Action Cycle is a conceptual framework that helps delivers
actionable insights for proffering tailored services to meet our clients’ needs

Vision:

We put into consideration our clients strategic goals and aims in
proffering services and solutions

Strategy:

We ensure the integration of our programmes, plans into
organisational practices and policies to achieve business
objectives and goals

Execution:

We deploy cost – effective, tailored and value-driven
services and solution that meets our clients expectations

Operation:

We ensure that our services are continually usable
and manageable by our clients

Review:

We continuously monitor performance, make
improvements to our services to ensure maximum
value is derived
Advisory and Consultancy

Business Technology

Business Information Security

Governance

Governance
•
•
•
•

Information Security Strategy & Architecture Development
Information Security Performance Management and Tracking
Business Continuity Planning
Business Impact and Disaster Readiness Assessments

Management

• Information security Program Development and Integration
• Information Security Policies, Standards, Procedures development
and maintenance
• Employee Information Security Awareness Training and Workshop
• Information Security Improvement Programs

Compliance
•
•
•
•

IT Infrastructure Risk/ Security Posture Assessment and Review
PCIDSS Assessment and compliance management
ISO27001 Assessment and compliance management
Information and Data protection

• IT Strategy and Planning
• COBIT
• IT Risk Management and Service Assurance

Management

• IT service Management
• IT Infrastructure design and Management
• IT performance management
Implementation Services
We implement Information Security solutions from leading
solution providers based on our clients’ unique needs and
requirements. we recommend and implement solutions to
ensure that our clients have their security objectives met.
From solutions that protect an organization’s perimeter to
solutions that prevent the loss of confidential data and
information or those that ensure that the security /risk
standpoint of an organization can be define.

Managed and Outsourced Services
We offer a variety of Managed Security and Compliance
services. This is also completed by our skilled personnel
outsourcing services. These services help our clients to
reduce the capital costs associated with deploying and
managing Information Security and Technology
Infrastructure and allow them to focus on their core
business operations.

Compliance as a Service

Provide organizations with Compliance management services
leveraging on our Managed Services Platform. Infoprive will
demonstrate compliance with regulations (PCI-DSS, SOX),
standards (ISO 27001) and corporate policies

Firewall Management as a Service

Periodically providing Firewall Management services to customers
leveraging on our Managed Services Platform

Log Management as a Service

Provision of Log and Event Management services leveraging our
Managed Services Platform

Backup as a Service

Provision of Network and Security Device backups services
leveraging our Managed Services Platform
Our Products

Business Impact
• 60% reduction in change management costs
• 80% reduction in firewall auditing costs
• Improved security posture
• Improved troubleshooting and network availability
• Improved organizational alignment and accountability

Skybox Product Portfolio

Firewall Assurance
Automated firewall
analysis and audits
Change Manager
Complete firewall
change workflow

HP Fortify

Network Assurance
Network compliance
and access path analysis

ObserveIT

Risk Control
Prioritize vulnerabilities
and attack scenarios
Threat Manager
Workflow to address
new threats

Pervade Software
Our People

Management Team

Our team is made up of experienced, creative, professional and business focused
people with competence in the design, implementation and management of
trusted Information security services.
The team draws on its knowledge; skill and experience in providing clients with
cost effective, value-driven and enabling services and solutions that help drive and
protect business outcomes.
Our wealth of experience is supported with industry recognized certifications in
relevant technologies and subject matter. An overview of a few certifications our
team currently holds.

Adetokunbo Omotosho has over a decade experience in information
Technology and Information Security. He was formerly the Divisional Head, IT Infrastructure & Enterprise Security at Interswitch
Limited, the leading transaction switching and electronic payment
processing company in Nigeria where he was responsible for the uninterrupted Information Technology operations and integrity of the
electronic switching network comprising of all banks, government
agencies and web merchants.
He has vast experience in the deployment and management of information technology and security infrastructure across the e-payment
Adetokunbo Omotosho sector within financial services industry. He led the deployment of
Chief Executive Officer
several electronic transactions switching Front End Processing (FEP)
systems for Banks in Nigeria and successfully managed the first Payment Card Industry Data
Security Standard (PCIDSS) compliance project in the country as well ensuring a hitch free
recertification. He has also been an external consultant and project manager to a couple of
banks on their PCIDSS compliance initiatives as well as the disaster recovery implementation
for their electronic payment infrastructure.
Adetokunbo has a Bachelor’s degree in Computer engineering from the prestigious Obafemi
Awolowo University, Ile-Ife and has attended senior management courses at the Lagos Business School and Boston University School of Management. He holds CRISC, CISM, COBIT
and ISO27001 certifications.

Kele Akaniro has over 12 years of experience in Information technology, working for some of the top firms in the institutional banking
and securities trading industry such as Citigroup, Merrill Lynch,
Bank of America, and Susquehanna International Group LLP. He
specializes in the selection, implementation, and management of
business information security technology investments.

Our technology partners

Kele Akaniro

Director, Global Business
Strategy

Pervade Software

He is a principle partner in Infoprive, and a Global Professional
service manager for AlgoSec; responsible for working with high-level
cross-functional teams of partners and customers, to deliver top-tier
implementation projects, as well as providing training to clients and
partners on the AlgoSec suite of application in North and Latin
America, Europe and Africa.

Mr. Akaniro holds a BA in Economics from Rutgers University, graduate certifications in
Technology and Financial management from Rutgers Business School, a Master of Science in
Computer Information Systems, with a concentration in Information Security, from Boston
University, a Certified AlgoSec Security Trainer, and also certified as a Project Management
Professional (PMP) by the Project Management Institute (PMI).
Gbolabo Awelewa is an Information Systems Management & Enterprise Security Expert with almost 10 years’ experience in the design,
development and management of secure Information Systems and
Infrastructure. He is a VMware Expert with Infrastructure Virtualization specialization, a certified Chief Information Security Officer, a
certified IT Service Manager and an Enterprise Information Security
Architect with Specialty in execution of Information Security strategy
and programs.
Gbolabo has been involved in the design and implementation of
secure Identity Access management systems, Security Operation
Gbolabo Awelewa
Centers, and Information Security Controls that enhance organizaDirector, Professional
tions compliance to relevant security standards and Frameworks
Service
like ISO, PCIDSS and COBIT. He is experienced in establishing
relationships between Information Security and strategic business partners.
Gbolabo worked as the Unit Head, Information Systems Security & Support Team of InfraTrust the Information Technology Infrastructure and Security Management competence
of Interswitch and was charged with ensuring the development and oversight of a secure and
continuously available infrastructure in support of Interswitch’s and financial services organization’s business capabilities. He played a relevant role in the Team that helped Interswitch
achieve its PCIDSS compliance, making Interswitch the first organization in West Africa to
be PCIDSS compliant.
He was also an Information Security Consultant at Altech W.A and his responsibilities
amongst others include Information security implementations, IT Vulnerability/Threat
management and also define, review and enforce information security policies, standards and
guidelines for business operations and technology implementations.
His Specialties are;
COBIT 5, PCIDSS, IT Governance, Risk & Compliance (GRC), SIEM (Symantec, SecureVue & Arcsight), EMV Cryptography/Security Two-Factor Authentication (RSA & Gemalto), Enterprise Security Management, Security Advisory, Data Loss Prevention, Enterprise
Systems Administration, Infrastructure Virtualization, IT Service Management, Business
Process Automation, Messaging & Collaboration, IT Vulnerability/threat management,
Identity & Access Management, Disaster Recovery/Business Continuity mgmt, and Project
Management.

Lagos Office
185, Moshood Olugbani Street,
off Ligali Ayorinde, Victoria Island Extension,
Lagos
Phone: 01-815-8152
U.K Office
2nd Floor, 43 Broomfield Road, Chelmsford,
Essex, United Kingdom, CM1 1SY
Phone: 0203-002-0651
U.S Office
53 king Street, Suite 2, New York, NY 10003
Phone: 212-537-6914
Email: info@infoprive.com
Website: www.infoprive.com
Registered company: 985937
Designed by Snapfactory Ltd|+234-12951097|+234-803328336|+234-8170594627|inquiry@snapfactoryng.com

More Related Content

What's hot

Yhcg - IT security and risk management
Yhcg  - IT security and risk managementYhcg  - IT security and risk management
Yhcg - IT security and risk management
Wilfred Barretto
 
Happiest Minds Technologies- ComplianceVigil Solution Overview
Happiest Minds Technologies- ComplianceVigil Solution OverviewHappiest Minds Technologies- ComplianceVigil Solution Overview
Happiest Minds Technologies- ComplianceVigil Solution Overview
Happiest Minds Technologies
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
Prime Infoserv
 
Cyber security infotech profile
Cyber security infotech profileCyber security infotech profile
Cyber security infotech profile
Cyber Security Infotech Pvt. Ltd.
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
Bob Rhubart
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
rbrockway
 
general_resume_12 1 linked in
general_resume_12 1 linked ingeneral_resume_12 1 linked in
general_resume_12 1 linked inJohn Masiliunas
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Craig Martin
 
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
IBM Sverige
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company ProfileKGanzy
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an Organisation
Syed Azher
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
PECB
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the CloudGaryArdito
 

What's hot (18)

Yhcg - IT security and risk management
Yhcg  - IT security and risk managementYhcg  - IT security and risk management
Yhcg - IT security and risk management
 
CV_Anil K Dubey V1.1
CV_Anil K Dubey V1.1CV_Anil K Dubey V1.1
CV_Anil K Dubey V1.1
 
Munawwar Khan
Munawwar KhanMunawwar Khan
Munawwar Khan
 
Happiest Minds Technologies- ComplianceVigil Solution Overview
Happiest Minds Technologies- ComplianceVigil Solution OverviewHappiest Minds Technologies- ComplianceVigil Solution Overview
Happiest Minds Technologies- ComplianceVigil Solution Overview
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen
 
Cyber security infotech profile
Cyber security infotech profileCyber security infotech profile
Cyber security infotech profile
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
TED Profile
TED ProfileTED Profile
TED Profile
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
general_resume_12 1 linked in
general_resume_12 1 linked ingeneral_resume_12 1 linked in
general_resume_12 1 linked in
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
 
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company Profile
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an Organisation
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
 
Cyber Security Management
Cyber Security ManagementCyber Security Management
Cyber Security Management
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the Cloud
 

Similar to Infoprive Brochure

Resume-Amit 1.0
Resume-Amit 1.0Resume-Amit 1.0
Resume-Amit 1.0Amit Verma
 
Company Presentation English
Company Presentation EnglishCompany Presentation English
Company Presentation English
Technowave
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service ProposalCarl Bradley Pate
 
Bill_Haase_Resume Dec 2015
Bill_Haase_Resume Dec 2015Bill_Haase_Resume Dec 2015
Bill_Haase_Resume Dec 2015Bill Haase
 
Visual_ CV_of_Umesh ranade
Visual_ CV_of_Umesh ranadeVisual_ CV_of_Umesh ranade
Visual_ CV_of_Umesh ranadeUmesh ranade
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
William McBorrough
 
G4S Security Services - Company Profile G4S
G4S Security Services - Company Profile G4SG4S Security Services - Company Profile G4S
G4S Security Services - Company Profile G4SIrfan Yunizar
 
Nigerian it professional management services
Nigerian it professional management servicesNigerian it professional management services
Nigerian it professional management services
shantanu pramanik
 
Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415Kevin Hosey
 
Cyber Eleven flyer
Cyber Eleven flyerCyber Eleven flyer
Cyber Eleven flyerTimmy Chou
 
Bob Tech Solutions Pvt Ltd Bangalore Reviews
Bob Tech Solutions Pvt Ltd Bangalore ReviewsBob Tech Solutions Pvt Ltd Bangalore Reviews
Bob Tech Solutions Pvt Ltd Bangalore Reviews
Bob Tech Solutions Bangalore
 
DEPL Consulting Brochure
DEPL Consulting BrochureDEPL Consulting Brochure
DEPL Consulting Brochure
Olanrewaju Omidire, CISA
 
Bob Tech Solutions Company Reviews
Bob Tech Solutions Company ReviewsBob Tech Solutions Company Reviews
Bob Tech Solutions Company Reviews
Bob Tech Solutions Bangalore
 
Cygnet corporate presentation
Cygnet corporate presentationCygnet corporate presentation
Cygnet corporate presentation
cygnet-infotech
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting OverviewRonan Martin
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your Job
Priyanka Aash
 
Nityo Infotech - Company Profile 1.1
Nityo Infotech - Company Profile 1.1Nityo Infotech - Company Profile 1.1
Nityo Infotech - Company Profile 1.1Muhambiga Selvaraja
 
VEA Services Portfolio
VEA  Services  PortfolioVEA  Services  Portfolio
VEA Services Portfolio
keygrant
 

Similar to Infoprive Brochure (20)

Resume-Amit 1.0
Resume-Amit 1.0Resume-Amit 1.0
Resume-Amit 1.0
 
Company Presentation English
Company Presentation EnglishCompany Presentation English
Company Presentation English
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal
 
Bill_Haase_Resume Dec 2015
Bill_Haase_Resume Dec 2015Bill_Haase_Resume Dec 2015
Bill_Haase_Resume Dec 2015
 
ARITA Brochure
ARITA Brochure  ARITA Brochure
ARITA Brochure
 
Visual_ CV_of_Umesh ranade
Visual_ CV_of_Umesh ranadeVisual_ CV_of_Umesh ranade
Visual_ CV_of_Umesh ranade
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
G4S Security Services - Company Profile G4S
G4S Security Services - Company Profile G4SG4S Security Services - Company Profile G4S
G4S Security Services - Company Profile G4S
 
Nigerian it professional management services
Nigerian it professional management servicesNigerian it professional management services
Nigerian it professional management services
 
Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415Seccuris-Overview-OneSheet-051415
Seccuris-Overview-OneSheet-051415
 
Cyber Eleven flyer
Cyber Eleven flyerCyber Eleven flyer
Cyber Eleven flyer
 
Bob Tech Solutions Pvt Ltd Bangalore Reviews
Bob Tech Solutions Pvt Ltd Bangalore ReviewsBob Tech Solutions Pvt Ltd Bangalore Reviews
Bob Tech Solutions Pvt Ltd Bangalore Reviews
 
DEPL Consulting Brochure
DEPL Consulting BrochureDEPL Consulting Brochure
DEPL Consulting Brochure
 
Bob Tech Solutions Company Reviews
Bob Tech Solutions Company ReviewsBob Tech Solutions Company Reviews
Bob Tech Solutions Company Reviews
 
Cygnet corporate presentation
Cygnet corporate presentationCygnet corporate presentation
Cygnet corporate presentation
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting Overview
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your Job
 
Nityo Infotech - Company Profile 1.1
Nityo Infotech - Company Profile 1.1Nityo Infotech - Company Profile 1.1
Nityo Infotech - Company Profile 1.1
 
VEA Services Portfolio
VEA  Services  PortfolioVEA  Services  Portfolio
VEA Services Portfolio
 

Recently uploaded

Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdfOffissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
offisadizayn
 
De-risk Your Digital Evolution - Hannah Grap
De-risk Your Digital Evolution - Hannah GrapDe-risk Your Digital Evolution - Hannah Grap
SEO Master Class - Steve Wiideman, Wiideman Consulting Group
SEO Master Class - Steve Wiideman,  Wiideman Consulting GroupSEO Master Class - Steve Wiideman,  Wiideman Consulting Group
SEO Master Class - Steve Wiideman, Wiideman Consulting Group
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
SMM Cheap - No. 1 SMM panel in the world
SMM Cheap - No. 1 SMM panel in the worldSMM Cheap - No. 1 SMM panel in the world
SMM Cheap - No. 1 SMM panel in the world
smmpanel567
 
Digital Commerce Lecture for Advanced Digital & Social Media Strategy at UCLA...
Digital Commerce Lecture for Advanced Digital & Social Media Strategy at UCLA...Digital Commerce Lecture for Advanced Digital & Social Media Strategy at UCLA...
Digital Commerce Lecture for Advanced Digital & Social Media Strategy at UCLA...
Valters Lauzums
 
Consumer Journey Mapping & Personalization Master Class - Sabrina Killgo
Consumer Journey Mapping & Personalization Master Class - Sabrina KillgoConsumer Journey Mapping & Personalization Master Class - Sabrina Killgo
Consumer Journey Mapping & Personalization Master Class - Sabrina Killgo
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Winning local SEO in the Age of AI - Dennis Yu
Winning local SEO in the Age of AI - Dennis YuWinning local SEO in the Age of AI - Dennis Yu
Playlist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music UPlaylist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music U
SemajahParker
 
Coca Cola Branding Strategy and strategic marketing plan
Coca Cola Branding Strategy and strategic marketing planCoca Cola Branding Strategy and strategic marketing plan
Coca Cola Branding Strategy and strategic marketing plan
Maswer Ali
 
My Personal Brand Exploration by Mariano
My Personal Brand Exploration by MarianoMy Personal Brand Exploration by Mariano
My Personal Brand Exploration by Mariano
marianooscos
 
How to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
How to use Short Form Video To Grow Your Brand and Business - Keenya KellyHow to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
How to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Core Web Vitals SEO Workshop - improve your performance [pdf]
Core Web Vitals SEO Workshop - improve your performance [pdf]Core Web Vitals SEO Workshop - improve your performance [pdf]
Core Web Vitals SEO Workshop - improve your performance [pdf]
Peter Mead
 
Winning local SEO in the Age of AI - Dennis Yu
Winning local SEO in the Age of AI - Dennis YuWinning local SEO in the Age of AI - Dennis Yu
Digital Marketing Trends - Experts Insights on How
Digital Marketing Trends - Experts Insights on HowDigital Marketing Trends - Experts Insights on How
May 2024 - VBOUT Partners Meeting Group Session
May 2024 - VBOUT Partners Meeting Group SessionMay 2024 - VBOUT Partners Meeting Group Session
May 2024 - VBOUT Partners Meeting Group Session
Vbout.com
 
10 Videos Any Business Can Make Right Now! - Shelly Nathan
10 Videos Any Business Can Make Right Now! - Shelly Nathan10 Videos Any Business Can Make Right Now! - Shelly Nathan
10 Videos Any Business Can Make Right Now! - Shelly Nathan
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Email Marketing Master Class - Chris Ferris
Email Marketing Master Class - Chris FerrisEmail Marketing Master Class - Chris Ferris
DMF Portfolio Piece Smart Goals - Artist Management.docx
DMF Portfolio Piece Smart Goals - Artist Management.docxDMF Portfolio Piece Smart Goals - Artist Management.docx
DMF Portfolio Piece Smart Goals - Artist Management.docx
TravisMalana
 
How to Run Landing Page Tests On and Off Paid Social Platforms
How to Run Landing Page Tests On and Off Paid Social PlatformsHow to Run Landing Page Tests On and Off Paid Social Platforms
How to Run Landing Page Tests On and Off Paid Social Platforms
VWO
 

Recently uploaded (20)

Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdfOffissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
Offissa Dizayn - Otel, Kafe, Restoran Kataloqu_240603_011042.pdf
 
De-risk Your Digital Evolution - Hannah Grap
De-risk Your Digital Evolution - Hannah GrapDe-risk Your Digital Evolution - Hannah Grap
De-risk Your Digital Evolution - Hannah Grap
 
SEO Master Class - Steve Wiideman, Wiideman Consulting Group
SEO Master Class - Steve Wiideman,  Wiideman Consulting GroupSEO Master Class - Steve Wiideman,  Wiideman Consulting Group
SEO Master Class - Steve Wiideman, Wiideman Consulting Group
 
SMM Cheap - No. 1 SMM panel in the world
SMM Cheap - No. 1 SMM panel in the worldSMM Cheap - No. 1 SMM panel in the world
SMM Cheap - No. 1 SMM panel in the world
 
Metaverse Marketing in the Generation of the Internet - Eugene Capon
Metaverse Marketing in the Generation of the Internet - Eugene CaponMetaverse Marketing in the Generation of the Internet - Eugene Capon
Metaverse Marketing in the Generation of the Internet - Eugene Capon
 
Digital Commerce Lecture for Advanced Digital & Social Media Strategy at UCLA...
Digital Commerce Lecture for Advanced Digital & Social Media Strategy at UCLA...Digital Commerce Lecture for Advanced Digital & Social Media Strategy at UCLA...
Digital Commerce Lecture for Advanced Digital & Social Media Strategy at UCLA...
 
Consumer Journey Mapping & Personalization Master Class - Sabrina Killgo
Consumer Journey Mapping & Personalization Master Class - Sabrina KillgoConsumer Journey Mapping & Personalization Master Class - Sabrina Killgo
Consumer Journey Mapping & Personalization Master Class - Sabrina Killgo
 
Winning local SEO in the Age of AI - Dennis Yu
Winning local SEO in the Age of AI - Dennis YuWinning local SEO in the Age of AI - Dennis Yu
Winning local SEO in the Age of AI - Dennis Yu
 
Playlist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music UPlaylist and Paint Event with Sony Music U
Playlist and Paint Event with Sony Music U
 
Coca Cola Branding Strategy and strategic marketing plan
Coca Cola Branding Strategy and strategic marketing planCoca Cola Branding Strategy and strategic marketing plan
Coca Cola Branding Strategy and strategic marketing plan
 
My Personal Brand Exploration by Mariano
My Personal Brand Exploration by MarianoMy Personal Brand Exploration by Mariano
My Personal Brand Exploration by Mariano
 
How to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
How to use Short Form Video To Grow Your Brand and Business - Keenya KellyHow to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
How to use Short Form Video To Grow Your Brand and Business - Keenya Kelly
 
Core Web Vitals SEO Workshop - improve your performance [pdf]
Core Web Vitals SEO Workshop - improve your performance [pdf]Core Web Vitals SEO Workshop - improve your performance [pdf]
Core Web Vitals SEO Workshop - improve your performance [pdf]
 
Winning local SEO in the Age of AI - Dennis Yu
Winning local SEO in the Age of AI - Dennis YuWinning local SEO in the Age of AI - Dennis Yu
Winning local SEO in the Age of AI - Dennis Yu
 
Digital Marketing Trends - Experts Insights on How
Digital Marketing Trends - Experts Insights on HowDigital Marketing Trends - Experts Insights on How
Digital Marketing Trends - Experts Insights on How
 
May 2024 - VBOUT Partners Meeting Group Session
May 2024 - VBOUT Partners Meeting Group SessionMay 2024 - VBOUT Partners Meeting Group Session
May 2024 - VBOUT Partners Meeting Group Session
 
10 Videos Any Business Can Make Right Now! - Shelly Nathan
10 Videos Any Business Can Make Right Now! - Shelly Nathan10 Videos Any Business Can Make Right Now! - Shelly Nathan
10 Videos Any Business Can Make Right Now! - Shelly Nathan
 
Email Marketing Master Class - Chris Ferris
Email Marketing Master Class - Chris FerrisEmail Marketing Master Class - Chris Ferris
Email Marketing Master Class - Chris Ferris
 
DMF Portfolio Piece Smart Goals - Artist Management.docx
DMF Portfolio Piece Smart Goals - Artist Management.docxDMF Portfolio Piece Smart Goals - Artist Management.docx
DMF Portfolio Piece Smart Goals - Artist Management.docx
 
How to Run Landing Page Tests On and Off Paid Social Platforms
How to Run Landing Page Tests On and Off Paid Social PlatformsHow to Run Landing Page Tests On and Off Paid Social Platforms
How to Run Landing Page Tests On and Off Paid Social Platforms
 

Infoprive Brochure

  • 1.
  • 2. Background I nfoprive is a core Business Information Security Company with strong competence in the development and management of information security services covering advisory, program development, program management and compliance. We deliver and maintain trusted and enabling Information services and solutions for our clients giving them the confidence to focus on their core business objectives and operations knowing that the security and resilience of the information capital that drives their business operations is assured. Vision and Mission Vision • To be the foremost client–driven organization that provides quality and focused information services to enable business growth Mission • To deliver cost effective services and solutions that provide value. Our Approach Our value proposition is to deliver a suite of business information services that help our clients achieve the reliability, integrity, confidentiality and resilience of their information capital. The fulfillment of our client’s business objectives is very important to us and we ensure that our clients derive maximum value and satisfaction from our services and solutions through the application of our action framework to our client needs
  • 3. Our Action Cycle Our Action Cycle is a conceptual framework that helps delivers actionable insights for proffering tailored services to meet our clients’ needs Vision: We put into consideration our clients strategic goals and aims in proffering services and solutions Strategy: We ensure the integration of our programmes, plans into organisational practices and policies to achieve business objectives and goals Execution: We deploy cost – effective, tailored and value-driven services and solution that meets our clients expectations Operation: We ensure that our services are continually usable and manageable by our clients Review: We continuously monitor performance, make improvements to our services to ensure maximum value is derived
  • 4. Advisory and Consultancy Business Technology Business Information Security Governance Governance • • • • Information Security Strategy & Architecture Development Information Security Performance Management and Tracking Business Continuity Planning Business Impact and Disaster Readiness Assessments Management • Information security Program Development and Integration • Information Security Policies, Standards, Procedures development and maintenance • Employee Information Security Awareness Training and Workshop • Information Security Improvement Programs Compliance • • • • IT Infrastructure Risk/ Security Posture Assessment and Review PCIDSS Assessment and compliance management ISO27001 Assessment and compliance management Information and Data protection • IT Strategy and Planning • COBIT • IT Risk Management and Service Assurance Management • IT service Management • IT Infrastructure design and Management • IT performance management
  • 5. Implementation Services We implement Information Security solutions from leading solution providers based on our clients’ unique needs and requirements. we recommend and implement solutions to ensure that our clients have their security objectives met. From solutions that protect an organization’s perimeter to solutions that prevent the loss of confidential data and information or those that ensure that the security /risk standpoint of an organization can be define. Managed and Outsourced Services We offer a variety of Managed Security and Compliance services. This is also completed by our skilled personnel outsourcing services. These services help our clients to reduce the capital costs associated with deploying and managing Information Security and Technology Infrastructure and allow them to focus on their core business operations. Compliance as a Service Provide organizations with Compliance management services leveraging on our Managed Services Platform. Infoprive will demonstrate compliance with regulations (PCI-DSS, SOX), standards (ISO 27001) and corporate policies Firewall Management as a Service Periodically providing Firewall Management services to customers leveraging on our Managed Services Platform Log Management as a Service Provision of Log and Event Management services leveraging our Managed Services Platform Backup as a Service Provision of Network and Security Device backups services leveraging our Managed Services Platform
  • 6. Our Products Business Impact • 60% reduction in change management costs • 80% reduction in firewall auditing costs • Improved security posture • Improved troubleshooting and network availability • Improved organizational alignment and accountability Skybox Product Portfolio Firewall Assurance Automated firewall analysis and audits Change Manager Complete firewall change workflow HP Fortify Network Assurance Network compliance and access path analysis ObserveIT Risk Control Prioritize vulnerabilities and attack scenarios Threat Manager Workflow to address new threats Pervade Software
  • 7. Our People Management Team Our team is made up of experienced, creative, professional and business focused people with competence in the design, implementation and management of trusted Information security services. The team draws on its knowledge; skill and experience in providing clients with cost effective, value-driven and enabling services and solutions that help drive and protect business outcomes. Our wealth of experience is supported with industry recognized certifications in relevant technologies and subject matter. An overview of a few certifications our team currently holds. Adetokunbo Omotosho has over a decade experience in information Technology and Information Security. He was formerly the Divisional Head, IT Infrastructure & Enterprise Security at Interswitch Limited, the leading transaction switching and electronic payment processing company in Nigeria where he was responsible for the uninterrupted Information Technology operations and integrity of the electronic switching network comprising of all banks, government agencies and web merchants. He has vast experience in the deployment and management of information technology and security infrastructure across the e-payment Adetokunbo Omotosho sector within financial services industry. He led the deployment of Chief Executive Officer several electronic transactions switching Front End Processing (FEP) systems for Banks in Nigeria and successfully managed the first Payment Card Industry Data Security Standard (PCIDSS) compliance project in the country as well ensuring a hitch free recertification. He has also been an external consultant and project manager to a couple of banks on their PCIDSS compliance initiatives as well as the disaster recovery implementation for their electronic payment infrastructure. Adetokunbo has a Bachelor’s degree in Computer engineering from the prestigious Obafemi Awolowo University, Ile-Ife and has attended senior management courses at the Lagos Business School and Boston University School of Management. He holds CRISC, CISM, COBIT and ISO27001 certifications. Kele Akaniro has over 12 years of experience in Information technology, working for some of the top firms in the institutional banking and securities trading industry such as Citigroup, Merrill Lynch, Bank of America, and Susquehanna International Group LLP. He specializes in the selection, implementation, and management of business information security technology investments. Our technology partners Kele Akaniro Director, Global Business Strategy Pervade Software He is a principle partner in Infoprive, and a Global Professional service manager for AlgoSec; responsible for working with high-level cross-functional teams of partners and customers, to deliver top-tier implementation projects, as well as providing training to clients and partners on the AlgoSec suite of application in North and Latin America, Europe and Africa. Mr. Akaniro holds a BA in Economics from Rutgers University, graduate certifications in Technology and Financial management from Rutgers Business School, a Master of Science in Computer Information Systems, with a concentration in Information Security, from Boston University, a Certified AlgoSec Security Trainer, and also certified as a Project Management Professional (PMP) by the Project Management Institute (PMI).
  • 8. Gbolabo Awelewa is an Information Systems Management & Enterprise Security Expert with almost 10 years’ experience in the design, development and management of secure Information Systems and Infrastructure. He is a VMware Expert with Infrastructure Virtualization specialization, a certified Chief Information Security Officer, a certified IT Service Manager and an Enterprise Information Security Architect with Specialty in execution of Information Security strategy and programs. Gbolabo has been involved in the design and implementation of secure Identity Access management systems, Security Operation Gbolabo Awelewa Centers, and Information Security Controls that enhance organizaDirector, Professional tions compliance to relevant security standards and Frameworks Service like ISO, PCIDSS and COBIT. He is experienced in establishing relationships between Information Security and strategic business partners. Gbolabo worked as the Unit Head, Information Systems Security & Support Team of InfraTrust the Information Technology Infrastructure and Security Management competence of Interswitch and was charged with ensuring the development and oversight of a secure and continuously available infrastructure in support of Interswitch’s and financial services organization’s business capabilities. He played a relevant role in the Team that helped Interswitch achieve its PCIDSS compliance, making Interswitch the first organization in West Africa to be PCIDSS compliant. He was also an Information Security Consultant at Altech W.A and his responsibilities amongst others include Information security implementations, IT Vulnerability/Threat management and also define, review and enforce information security policies, standards and guidelines for business operations and technology implementations. His Specialties are; COBIT 5, PCIDSS, IT Governance, Risk & Compliance (GRC), SIEM (Symantec, SecureVue & Arcsight), EMV Cryptography/Security Two-Factor Authentication (RSA & Gemalto), Enterprise Security Management, Security Advisory, Data Loss Prevention, Enterprise Systems Administration, Infrastructure Virtualization, IT Service Management, Business Process Automation, Messaging & Collaboration, IT Vulnerability/threat management, Identity & Access Management, Disaster Recovery/Business Continuity mgmt, and Project Management. Lagos Office 185, Moshood Olugbani Street, off Ligali Ayorinde, Victoria Island Extension, Lagos Phone: 01-815-8152 U.K Office 2nd Floor, 43 Broomfield Road, Chelmsford, Essex, United Kingdom, CM1 1SY Phone: 0203-002-0651 U.S Office 53 king Street, Suite 2, New York, NY 10003 Phone: 212-537-6914
  • 9. Email: info@infoprive.com Website: www.infoprive.com Registered company: 985937 Designed by Snapfactory Ltd|+234-12951097|+234-803328336|+234-8170594627|inquiry@snapfactoryng.com