Personal Information
Organización/Lugar de trabajo
Washington D.C. Metro Area United States
Ocupación
Independent Cyber Security and Risk Consultant / Security Architect / ISSO, C|CISO CISSP CRISC CSM CPT ITIL PMP(pending)
Acerca de
I provide Cyber Security and Risk Management expertise in the following areas:
* Identity and Access Management (IAM)
* Application Development Security
* Business Continuity and Disaster Recovery Planning
* Cryptography and Encryption
* Information Security Governance, Risk and Compliance (GRC)
* Legal, Regulations and Compliance
* Operations Security
* CLOUD Security/FEDRAMP
* Security Architecture and Design
* Telecommunications and Network Security
* Change and Configuration Management
* Security and Privacy Controls Assessment
* Patch Management
I also provide risk assessments, threat analyses, system/vulnerability scanning and assessments, system tests and evaluations...
Recomendaciones
(11)Hacker's Practice Ground - CarolinaCon - 2015
lokeshpidawekar
•
Hace 8 años
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
lokeshpidawekar
•
Hace 8 años
Owasp zap
ColdFusionConference
•
Hace 9 años
My pwk & oscp journey
M.Syarifudin, ST, OSCP, OSWP
•
Hace 8 años
Recruiters' guide to hire an Ethical hacker
Ayman Hussein
•
Hace 8 años
Penetration testing web application web application (in) security
Nahidul Kibria
•
Hace 9 años
Linux server penetration testing project
Emad Soltani
•
Hace 8 años
Networking and penetration testing
Mohit Belwal
•
Hace 9 años
CyberLab CCEH Session - 19 Penetration Testing
CyberLab
•
Hace 8 años
Penetration testing
Ammar WK
•
Hace 12 años
A Beginners Guide to noSQL
Mike Crabb
•
Hace 8 años
Personal Information
Organización/Lugar de trabajo
Washington D.C. Metro Area United States
Ocupación
Independent Cyber Security and Risk Consultant / Security Architect / ISSO, C|CISO CISSP CRISC CSM CPT ITIL PMP(pending)
Acerca de
I provide Cyber Security and Risk Management expertise in the following areas:
* Identity and Access Management (IAM)
* Application Development Security
* Business Continuity and Disaster Recovery Planning
* Cryptography and Encryption
* Information Security Governance, Risk and Compliance (GRC)
* Legal, Regulations and Compliance
* Operations Security
* CLOUD Security/FEDRAMP
* Security Architecture and Design
* Telecommunications and Network Security
* Change and Configuration Management
* Security and Privacy Controls Assessment
* Patch Management
I also provide risk assessments, threat analyses, system/vulnerability scanning and assessments, system tests and evaluations...