Securing your organization
Tel: 860 941-9262
August 9, 2015
The Good, The Bad, and The Profitable: Commercial Threat Intelligence in 2015
What are the different types of offerings on the market?
Can you discuss inherent problems and contradictions in commercial threat intelligence?
Can you reveal the latest trends?
Can you recommend evaluation criteria for the savvy CISO?
Is your Digital Footprint secure?
What constitutes the digital footprint of an enterprise?
June 22, 2016
Framework for Cyber Security
Why Choose JED Consulting Services LLC?
• The HIPAA Security Rule provides the "what" in regard to requirements with which health care organizatio...
Critical Security Controls
November 13, 2016
How I became involved in InfoSec
Account Monitoring and Control
Application software security
Controlled access on need to know
Data loss protection
Secure configurations for network devices
Wireless Device Control
incident response and managment
skills gap assessment