Personal Information
Organização/Local de trabalho
Washington D.C. Metro Area United States
Cargo
Independent Cyber Security and Risk Consultant / Security Architect / ISSO, C|CISO CISSP CRISC CSM CPT ITIL PMP(pending)
Sobre
I provide Cyber Security and Risk Management expertise in the following areas:
* Identity and Access Management (IAM)
* Application Development Security
* Business Continuity and Disaster Recovery Planning
* Cryptography and Encryption
* Information Security Governance, Risk and Compliance (GRC)
* Legal, Regulations and Compliance
* Operations Security
* CLOUD Security/FEDRAMP
* Security Architecture and Design
* Telecommunications and Network Security
* Change and Configuration Management
* Security and Privacy Controls Assessment
* Patch Management
I also provide risk assessments, threat analyses, system/vulnerability scanning and assessments, system tests and evaluations...
Gostaram
(11)Hacker's Practice Ground - CarolinaCon - 2015
lokeshpidawekar
•
Há 8 anos
Hacker's Practice Ground - Wall of Sheep workshops - Defcon 2015
lokeshpidawekar
•
Há 8 anos
Owasp zap
ColdFusionConference
•
Há 9 anos
My pwk & oscp journey
M.Syarifudin, ST, OSCP, OSWP
•
Há 8 anos
Recruiters' guide to hire an Ethical hacker
Ayman Hussein
•
Há 8 anos
Penetration testing web application web application (in) security
Nahidul Kibria
•
Há 9 anos
Linux server penetration testing project
Emad Soltani
•
Há 8 anos
Networking and penetration testing
Mohit Belwal
•
Há 9 anos
CyberLab CCEH Session - 19 Penetration Testing
CyberLab
•
Há 8 anos
Penetration testing
Ammar WK
•
Há 12 anos
A Beginners Guide to noSQL
Mike Crabb
•
Há 8 anos
Personal Information
Organização/Local de trabalho
Washington D.C. Metro Area United States
Cargo
Independent Cyber Security and Risk Consultant / Security Architect / ISSO, C|CISO CISSP CRISC CSM CPT ITIL PMP(pending)
Sobre
I provide Cyber Security and Risk Management expertise in the following areas:
* Identity and Access Management (IAM)
* Application Development Security
* Business Continuity and Disaster Recovery Planning
* Cryptography and Encryption
* Information Security Governance, Risk and Compliance (GRC)
* Legal, Regulations and Compliance
* Operations Security
* CLOUD Security/FEDRAMP
* Security Architecture and Design
* Telecommunications and Network Security
* Change and Configuration Management
* Security and Privacy Controls Assessment
* Patch Management
I also provide risk assessments, threat analyses, system/vulnerability scanning and assessments, system tests and evaluations...