Please leave this field empty.

Contact Us







captcha

* Required Fields

Contact Us

Managing Security Risk Across Your Enterprise

Multi-Vector Threats: Managing Security Risk Across Your Enterprise

August 24, 2017

Cyber Security Cover with outlineManaging risk at the enterprise level involves close collaboration of the physical and information security functions, responsibilities and missions. This encompasses enhanced communications and information sharing between the information technology, operational technology and physical security groups. The combined joint security operations center (JSOC) can be the most effective way to manage security risks across the enterprise.

The following article, Multi-Vector Threats and the  Argument for Greater Convergence, written in conjunction with our strategic partners at Revolutionary Security, was recently published in Cyber Security – A Peer Reviewed Journal. It addresses how an organization’s security operations center can converge their physical and information security functions to effectively manage multi-vector threats and protect themselves from the evolving threat landscape.

Download your complimentary copy.

 


Ron Chandler, CISSP 

Vice President, Guidepost Solutions Security & Technology Consulting

rchandler@guidepostsolutions.com

Ron Chandler specializes in enterprise solutions and is responsible for all service segments regarding the implementation of cybersecurity, global master planning/command and control programs (GSOC) and managed security services programs either as standalone service offerings or as an integrated suite of solutions.

 

Matthew Wharton

President, Guidepost Solutions Security & Technology Consulting

mwharton@guidepostsolutions.com

Matthew Wharton oversees the core services of Guidepost Solutions Security and Technology Consulting division, including cybersecurity, system design and project management, global command and control centers, security assessments and managed services. He is a career security professional with more than 30 years of experience leading security consulting and integration firms.

 

Newsletter

Please enter your email below to subscribe

Please leave this field empty.