Jedconsultingservices.com

Securing your organization

jdonnelly91@yahoo.com

Tel: 860 941-9262

  • Facebook App Icon
  • Twitter App Icon
  • Google+ App Icon
  • Home

  • Our Partners

  • Services

  • Clients

  • CSX Training

  • Contact

  • Blog

  • Book Online

  • More

    JEKK

    What We Offer
    FAQ
    Meet The Team
    Our Clients
    Contact Us
    Visit our blog
    Like us on facebook
    Give us your feedback

    Meet The Team

    Our team can provide: 1) Threat Assessment and analysis, 2) Asset Identification, 3) Vulnerability analysis '

    4) Risk Evaluation 5) Interim Report  6) Interim Report 7) Establish risk acceptance criteria 8)Safeguard (countermeasures ) selection with risk mitigation 9) Cost Benefit Analysis 10) Final Report

    ​

    As a security professional, we know the threats, understand the fundamental information security tools, and are able to apply this knowledge in risk management. 

    ​

    As discussed throughout this web page, there are vulnerabilities in hardware and software systems we use. Some of these vulnerabilities are weaknesses-  that can be exploited  and used to compromise the system.

    These vulnerabilities, combined with threats, add up to the risks  we are exposed to. Risk management is needed to make sure we are prepared just in case those threats become a reality

    John E. Donnelly

    Founder & Co-Director

     

     

    jdonnelly91@yahoo.com

    O: 860-941-9262

     

    JED Security Approach to Cyber Security.docx
    Templates PDF.pdf
    health-care-cyberthreat-report-widespread-compromises-detected-compliance-nightmare-horizon-34735.pdf
    health-care-cyberthreat-report-widespread-compromises-detected-compliance-nightmare-horizo...735.pdf