Security and Risk Management Policies, Standards, Procedures and Guidelines

 

World Wide Web  - August 4, 2016 Common wisdom shows that one of the most valuable assets any Company has is trust. Businesses go to extreme measures to build this trust.  But all of this may simply not be enough.  It is no secret that successful companies implement a Security Champion so to speak and Kieran Upadrasta is just that person who reveals visibility insights by assisting banks, financial institutions, and telecom sectors of when and how to encrypt, for proper security consulting and risk management.

Governance is the process of managing, directing, controlling, and influencing organizational decisions, actions, and behaviors. Security governance principles, even in the most security-conscious organizations need to be addressed by someone who can provide expert leadership.

A security champion is someone who coordinates and manages security efforts across the company, including IT, human resources (HR), communications, legal, facilities management, and other groups. The most successful security officer understands compliance, law, regulations, and business. That person is specifically trained and hired to balance security, productivity, and innovation.

Kieran Upadrasta is an experienced Security Consultant who is dedicated to keeping professional large companies on track in a cyber age of data management and encryption. Kieran is keen on focused efforts toward education for employees in recognizing attacks and how to prevent them. 

As an expert witness who works with all forms of incident response, crises management, and major incident management Kieran’s experience includes:

•  Information Security governance - COBIT
• Risk management - SARA, SPRINT
• Threat management - Arbor's SP Peakflow, TMS
• Vulnerabilities management -Qualys, ISS, Nessus, Foundstone
• Security architecture - HLD & LLD creation, Enterprise architecture - TOGAF
• Firewalls, IDS, IPS - Checkpoint, McAfee, Cisco, Juniper, ISS, Snort, Sourcefire
• Vpns, IPsec Site to site, Client to Site, Endpoint encryption - Safe boot, Pointsec
• Proxies, Content filtering - Bluecoat, ISA server, Finjan, Cisco Ironport, Websense
• Cryptology, Digital watermarking, Crypto analysis, Steganography, Encryption
• Payment card industry data security standard (PCIDSS)
• IT Audit, Arcsight insight, Skybox security (SOX)
• SIEM : Arcsight ESM, RSA Envision, Splunk, LogRhythm, RSA Security Analytics
• Information security management systems ISO27001
• Policy standards & framework
• Identity and access management (IAM)

 

Security, risk and assessment are essential components for analyzing data and staying ahead of the ever changing game in what is referred to as a cyber attack. Keiran has the expertise and knowledge to impart direction and protection for businesses that are developing high priority projects and ideas.

Kieran believes that over 90% of all attacks that occur are preventable. He brings a wealth of experience, and information to the forefront of technology companies, gap in security. Kieran delivers full risk assessments while he educates the corporate culture in a climate of cyber hygiene.

Media Contact:

Swathi Gaikwad