I am a CISSP certified professional working in the field of cybersecurity since 2012. I work with businesses to prevent the hacking, theft, or damage of data, software, and hardware.
I can help implement the CIS 20 cybersecurity controls and contour your business' cybersecurity posture around the NIST Cybersecurity Framework functions: Identify, Protect, Detect, Respond and Recover.
My professional experience includes the following sectors: Information Technology, Telecommunications, Utility, Finance.
The CIS 20 cybersecurity controls:
- Inventory and Control of Hardware Assets
- Inventory and Control of Software Assets
- Continuous Vulnerability Management
- Controlled Use of Administrative Privileges
- Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers
- Maintenance, Monitoring and Analysis of Audit Logs
- Email and Web Browser Protections
- Malware Defenses
- Limitation and Control of Network Ports, Protocols and Services
- Data Recovery Capabilities
- Secure Configuration for Network Devices, such as Firewalls, Routers and Switches
- Boundary Defense
- Data Protection
- Controlled Access based on the Need to Know
- Wireless Access Control
- Account Monitoring and Control
- Implement a Security Awareness and Training Program
- Application Software Security
- Incident Response & Management
- Penetration Tests and Red Team Exercises