hk it security consultant profile
Post on 25-May-2015
251 Views
Preview:
DESCRIPTION
TRANSCRIPT
ProfileIn this rapidly evolving IT sector and our dependence on computers in all aspect of our business and the even more
dependence on the internet usage, security becomes the vital key in safe guarding our data from pilferage andmisuse. There are many software and hardware available in the market to protect our computers and its data but veryoften the user is not advised correctly from his application stand point, be it in choosing the right Hardware, Software,Networking Etc. Hence we over spend and underutilise and still have very unstable IT Infrastructure susceptible toData Pilferage and Abuse.
Having said that, I have taken it as a challenge to give what the industry needs in terms of investment to returns be itinvestment in Hardware, Software, Security in data management etc. With this challenge in mind I went on to do myPhD in Information security. And having worked for close to two decade in various large establishments. I have gaineda fair amount of understanding on the optimisation and protection of the investment in IT for any business enterprisesbe it Small Medium or Large.
Keeping this challenge in mind me and my team of professional drawn from their respective fields came under thisumbrella called HK IT Solutions an end to end IT Solution company providing that cutting edge advantage to our clientsin terms of giving our recommendations in setting up or managing the existing IT Infrastructure that would suit theirapplication and budget.
Keeping this challenge in mind me and my team of professional drawn from their respective fields came under thisumbrella called HK IT Solutions an end to end IT Solution company providing that cutting edge advantage to our clientsin terms of giving our recommendations in setting up or managing the existing IT Infrastructure that would suit theirapplication and budget.
Optimisation in terms of utility and cost being our fundamental basis to start this organisation, we have our marketresearch team who are in the process of continuously scanning the market and keeping us updated in the latesttechnologies available and also newer challenges our clients come up with. We share these developments with ourclients by way of periodical news letter by e-mail.
We have to our credit a very small client base both in India and overseas who are extremely appreciative to ourperspective in carrying forward our ambition to optimise and secure their IT Infrastructure. This has helped us inreassuring ourselves that this is what a client in need of.
Above all as a policy we share our knowledge with the younger generation by giving them training programmes atthe college levels so that they become better IT Professional having a holistic approach.
… Dr. THENNARASU.E (HARSHA) PhD (IS)CEO
IT Consultancy Services
IT Managed Services Software Copy rights legal
advice Network Design Data Center Design Firewall (Hardware/Software) ASC (Annual Service Contract) SAP solutions Staff Training on Information
security Cyber crimes/ & vulnerabilities
Mailing Solutions Internet Bandwidth Solutions IT Inventory Management Anti Virus & Security Software IT Outsource Virtualization (Server/Desktop) Video Conferencing (Tanburg, Polymer) Document collaborations (Share Point) Cost effective solutions on all IT requirement
& challenges Bulk Mailing & Bulk SMS
IT Managed Services Software Copy rights legal
advice Network Design Data Center Design Firewall (Hardware/Software) ASC (Annual Service Contract) SAP solutions Staff Training on Information
security Cyber crimes/ & vulnerabilities
Mailing Solutions Internet Bandwidth Solutions IT Inventory Management Anti Virus & Security Software IT Outsource Virtualization (Server/Desktop) Video Conferencing (Tanburg, Polymer) Document collaborations (Share Point) Cost effective solutions on all IT requirement
& challenges Bulk Mailing & Bulk SMS
IT Security Audits/ Assessments
Methodologies
4
Methodologies
Phase 1PreliminaryReview
Phase 2Scope of ISMS
Phase 3GAP Analysis
Phase 4Risk Assessment
Phase 5Risk Mitigationand Selection of Controls
Phase 6Redesign of Security
Architecture(Optional)
Phase 7Policy and
Procedures Drafting
Phase 8Incident
Management
5
Phase 9Design ofBCP/DRP
Phase 10Design of Audit
Charter
Phase 11Security Awareness
Program
Phase 12Security Metrics
Phase 16Periodic Review
(Optional)
Phase 15Certification
Phase 14Internal Audits Phase 13
Implementation ofcontrols
(We would provideGuidance)
Information Security AssessmentsRisk Analysis/Gap Analysis/VA/PT
& Trainings
SOX/ISO/COBIT/HIPAA & Other International Standards
Clienteles in India / Overseas
Our IT Security Specialists:-
Dr. THENNARASU.E (Harsha) PhDResearcher Information Security on High End ApplicationsInformation Security Assessment expertMember of DSCI (Data Security Council of India)Trainer Certified Ethical HackerOverseas Auditing ExperienceGuest Lecturing (Universities, Colleges)Guest Speaker of Innovating for India Seminar
Dr. CHANDRASEKAR UMAPATHY (PhD, IIM)
OWASP Chennai Chapter LeadSri Lanka OWASP Chapter MentorInvited Trainer at OWASP India conference.Cloud Alliance Security Chennai Chapter Lead.Reviewer of ISACA CRISC Review Manual 2011.Cloud Security Alliance – Control Matrix Co-AuthorISACA Best Trainer for the Year 2011-2012
7
Our IT Security Specialists:-
Dr. THENNARASU.E (Harsha) PhDResearcher Information Security on High End ApplicationsInformation Security Assessment expertMember of DSCI (Data Security Council of India)Trainer Certified Ethical HackerOverseas Auditing ExperienceGuest Lecturing (Universities, Colleges)Guest Speaker of Innovating for India Seminar
Dr. CHANDRASEKAR UMAPATHY (PhD, IIM)
OWASP Chennai Chapter LeadSri Lanka OWASP Chapter MentorInvited Trainer at OWASP India conference.Cloud Alliance Security Chennai Chapter Lead.Reviewer of ISACA CRISC Review Manual 2011.Cloud Security Alliance – Control Matrix Co-AuthorISACA Best Trainer for the Year 2011-2012
Our IT Security Specialists:-
Mr. RAJENDRANCertified CISP from Dept of IT Govt of IndiaSubject matter expert & Trainer for Tamil Nadu Police academicActive member and the Treasurer of Cyber Society of India.Pursuing PhD in the area of Cyber Crime in BanksMember of Indian Society of Victimology
8
Mr. TS. RAGHUNATHAN,Certified security professional by Cisco, Cyberoam, Watchguard, etc.,Practitioner Information & Network Security assessments/auditsVA/PT specialistCertified Ethical Hacker12 year experience in Information & Network Security Domains
Benefits by IT Assessments/ Audits
Restructured Operations aligned with business needs
An informed view of organizational security posture
First-hand knowledge about organizational security shortcomings inprocesses and technologies
Increase in confidence levels after getting IT Audited/Assessed
Understanding of benefits with a proactive approach to IT security
Added selling point in offering secured services
Increase in customer confidence levels
Secure information infrastructure aligned with business needs
Justified optimal solutions to provide maximum return on objectives
Improved quality of service due to performance optimization9
Benefits by IT Assessments/ Audits
Restructured Operations aligned with business needs
An informed view of organizational security posture
First-hand knowledge about organizational security shortcomings inprocesses and technologies
Increase in confidence levels after getting IT Audited/Assessed
Understanding of benefits with a proactive approach to IT security
Added selling point in offering secured services
Increase in customer confidence levels
Secure information infrastructure aligned with business needs
Justified optimal solutions to provide maximum return on objectives
Improved quality of service due to performance optimization
Our Expertise
INNOVATING FOR INDIA SEMINAR @ BISHOP COTTON WOMEN’S CHRISTIAN COLLEGEADDRESSED BY Dr. HARSHA, Chief IT Security Advisor
Information Security Training to Vijay Bank, HO
E-waste Collection Program forsupporting
Senior Citizens
CSR Initiative to generaterevenue for NGO
In partner with
Dignity Foundation
Articles – Head Consultant
Articles – Head Consultant
Articles – Head Consultant- Feb’ 2013
Clients
Partners
Thank you IT Consultations@
www.hkit.in
top related