top of page

 

LATEST REPORT ON INFOSEC

Top Reasons to Pay Attention to the Dark Web Tim Layton - Risk Management By understanding your adversaries’ activity on the Dark Web , you can take more of a proactive approach that helps reduce uncertainty and improves overall cyber resiliency.

 

Read full story

Why Ransomware is Winning - and How to Turn the Tide Scott Gainey - Malware By monitoring for and detecting the underlying and shared behaviors of malware we can effectively stop ransomware infections before they can cause damage.

 

Read full story

 

ISO Service

 

The Intelligent Security Outsourcing (ISO) service provides security solutions for small and medium-sized organizations. The ISO services’ main duties include doing research, collecting data, developing secure strategies and maximizing productivity. ISO services also implement security principles and follow strict privacy policies, conduct assessments of business information technology environments.

 

The ISO service will:

 

  • Configure and analyze security tools and software.

  • Coordinate with IT and end users to minimize disruptions and protect assets.

  • Document, prioritize, and analyze security threats, incidents, and key metrics.

  • Review daily and periodic data to identify, report, and remedy vulnerabilities.

ISMIS Service

 

I.S.I. understands that not all organizations can afford a full-time Chief Information Security Officer (CISO) in their payroll, and this is the reason for developing the ISMIS service. A partnership with I.S.I., with a minimum duration of 600 hours used as needed, the ISMIS service will play the role of a much needed CISO for your organization.

 

The ISMIS service will:

 

  • Ensure compliance with regulations and security policies.

  • Develop contingency plans and manage security breaches.

  • Supervise development and application of security procedures and protocols.

  • Maintain procedures, standards, and policies to protect the privacy and integrity of data.

  • Provide information and training regarding information technology and security systems.

IS-Metrics Service

 

Instead of taking inordinate amounts of time and finances to develop an IS-Metrics system, our product will enable top management to conduct security audits with significantly reduced time and cost.  Further, security managers will be able to provide guidance for management determining the organization’s past, present and future security goals, and conduct briefings regarding the IS needs of the entire company with great accuracy and precision.

 

I.S.I. will develop IS-Metrics based on specific frameworks such as the following:

 

  • National Institute of Standards and Technology (NIST)

  • Information Technology Infrastructure Library (ITIL v3.0)

  • The North American Electric Reliability Corporation (NERC)

  • International Organization for Standardization (ISO/IEC 27002)

  • Control Objectives for Information and Related Technology (COBIT v5.0)

Services

 

ISO

ISMIS

IS-Metrics

XM-CIW

XM-CIW Training Program


I.S.I. offers a training program for executive management of Cyber Information Warfare, (XM-CIW) to ascertain existing framework for obtaining adequate information security metrics in their environment, to understand the types of regulations that govern their business sectors, to learn the differences between a standard and guidance, to use hands-on penetrating testing tools, and to execute penetration tests. The XM-CIW training program will help with the following:

 

  • In depth review of NIST, ITIL, NERC, ISO/27002, and COBIT frameworks

  • Hands on ethical hacking usage of tools and attack methods

  • Hands on network defence tools, methods, and practice

  • Hands-on penetration testing lab

  • On site lab or remote login

© 2017 Information Security International, LLC, (I.S.I.). All Rights Reserved

  • YouTube Social  Icon
  • LinkedIn Social Icon
  • c-facebook
  • Twitter Classic
  • Google Classic
bottom of page