Information security management

You may need to do a quick third-party registration to access certain ones.

Articles
Whitepapers
Podcasts
Webcasts
  • Managing network security threats with an ERM strategy
  • How Security Breaches Happen and What Your Organization Can Do About It
  • Why you need to create an ESI strategy - ESI, or Electronically Stored Information, strategies have become mandatory over the past few years. This webcast focuses on how to approach the requirements ESI is designed to facilitate including e-discovery of documents for legal cases. It will also address how to organize and establish ownership of data groups, how to create a system that accesses knowledge efficiently, and how to maintain the system so it stays in compliance with various regulations.
  • Strategies for Securing your Enterprise for Success - Securing an enterprise organization is complex. Join this webcast to learn about key strategies and recommendations on how to secure your enterprise organization for success.
  • Implementing Security with Systems Management - Best Practices for companies with fewer than 500 users - As security becomes more critical to the computing environment, businesses must look to streamline systems management. This webcast outlines the critical security issues that need to be addressed in today's computing environment. Learn more about securing systems management in your business, including best practices for integrating security into the IT infrastructure, common systems management oversights, common security risks and the business problems they cause, and practical tips for gaining control of the IT network.
  • Hacking Your Operations for Improved Security - Many organizations test their information systems for security vulnerabilities on an ongoing basis. The problem is that's only half the issue. There's also security documentation, users, and various IT-related business processes that affect overall information risks just as much. In this paid webcast hosted by ComplianceOnline, learn about real-world examples and how you can use the malicious mindset to look beyond the technical weaknesses and view your information security from a broader perspective that takes the entire business in account.
  • How to Keep Your Business Network Safe and Secure - Managing any network regardless of size is a challenging job. Most network security is focused on incident and event response rather than effectively managing vulnerabilities, but a plan needs to be established, refined, and properly tested on a regular basis to confirm your security controls are working.
    possible tools to use, and how to analyze the results. In this webcast, I'll lead you through the best practices when it comes to securing your small or medium-sized business network.

Client Testimonials

"A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)