Top Banner
18

HK IT Security Consultant Profile

May 25, 2015

Download

Technology

An expert Security consultants firm's presentation... security audits conducted as per International standards....for more info pl visit www.hkit.in
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: HK IT Security Consultant Profile
Page 2: HK IT Security Consultant Profile

ProfileIn this rapidly evolving IT sector and our dependence on computers in all aspect of our business and the even more

dependence on the internet usage, security becomes the vital key in safe guarding our data from pilferage andmisuse. There are many software and hardware available in the market to protect our computers and its data but veryoften the user is not advised correctly from his application stand point, be it in choosing the right Hardware, Software,Networking Etc. Hence we over spend and underutilise and still have very unstable IT Infrastructure susceptible toData Pilferage and Abuse.

Having said that, I have taken it as a challenge to give what the industry needs in terms of investment to returns be itinvestment in Hardware, Software, Security in data management etc. With this challenge in mind I went on to do myPhD in Information security. And having worked for close to two decade in various large establishments. I have gaineda fair amount of understanding on the optimisation and protection of the investment in IT for any business enterprisesbe it Small Medium or Large.

Keeping this challenge in mind me and my team of professional drawn from their respective fields came under thisumbrella called HK IT Solutions an end to end IT Solution company providing that cutting edge advantage to our clientsin terms of giving our recommendations in setting up or managing the existing IT Infrastructure that would suit theirapplication and budget.

Keeping this challenge in mind me and my team of professional drawn from their respective fields came under thisumbrella called HK IT Solutions an end to end IT Solution company providing that cutting edge advantage to our clientsin terms of giving our recommendations in setting up or managing the existing IT Infrastructure that would suit theirapplication and budget.

Optimisation in terms of utility and cost being our fundamental basis to start this organisation, we have our marketresearch team who are in the process of continuously scanning the market and keeping us updated in the latesttechnologies available and also newer challenges our clients come up with. We share these developments with ourclients by way of periodical news letter by e-mail.

We have to our credit a very small client base both in India and overseas who are extremely appreciative to ourperspective in carrying forward our ambition to optimise and secure their IT Infrastructure. This has helped us inreassuring ourselves that this is what a client in need of.

Above all as a policy we share our knowledge with the younger generation by giving them training programmes atthe college levels so that they become better IT Professional having a holistic approach.

… Dr. THENNARASU.E (HARSHA) PhD (IS)CEO

Page 3: HK IT Security Consultant Profile

IT Consultancy Services

IT Managed Services Software Copy rights legal

advice Network Design Data Center Design Firewall (Hardware/Software) ASC (Annual Service Contract) SAP solutions Staff Training on Information

security Cyber crimes/ & vulnerabilities

Mailing Solutions Internet Bandwidth Solutions IT Inventory Management Anti Virus & Security Software IT Outsource Virtualization (Server/Desktop) Video Conferencing (Tanburg, Polymer) Document collaborations (Share Point) Cost effective solutions on all IT requirement

& challenges Bulk Mailing & Bulk SMS

IT Managed Services Software Copy rights legal

advice Network Design Data Center Design Firewall (Hardware/Software) ASC (Annual Service Contract) SAP solutions Staff Training on Information

security Cyber crimes/ & vulnerabilities

Mailing Solutions Internet Bandwidth Solutions IT Inventory Management Anti Virus & Security Software IT Outsource Virtualization (Server/Desktop) Video Conferencing (Tanburg, Polymer) Document collaborations (Share Point) Cost effective solutions on all IT requirement

& challenges Bulk Mailing & Bulk SMS

Page 4: HK IT Security Consultant Profile

IT Security Audits/ Assessments

Methodologies

4

Methodologies

Page 5: HK IT Security Consultant Profile

Phase 1PreliminaryReview

Phase 2Scope of ISMS

Phase 3GAP Analysis

Phase 4Risk Assessment

Phase 5Risk Mitigationand Selection of Controls

Phase 6Redesign of Security

Architecture(Optional)

Phase 7Policy and

Procedures Drafting

Phase 8Incident

Management

5

Phase 9Design ofBCP/DRP

Phase 10Design of Audit

Charter

Phase 11Security Awareness

Program

Phase 12Security Metrics

Phase 16Periodic Review

(Optional)

Phase 15Certification

Phase 14Internal Audits Phase 13

Implementation ofcontrols

(We would provideGuidance)

Page 6: HK IT Security Consultant Profile

Information Security AssessmentsRisk Analysis/Gap Analysis/VA/PT

& Trainings

SOX/ISO/COBIT/HIPAA & Other International Standards

Clienteles in India / Overseas

Page 7: HK IT Security Consultant Profile

Our IT Security Specialists:-

Dr. THENNARASU.E (Harsha) PhDResearcher Information Security on High End ApplicationsInformation Security Assessment expertMember of DSCI (Data Security Council of India)Trainer Certified Ethical HackerOverseas Auditing ExperienceGuest Lecturing (Universities, Colleges)Guest Speaker of Innovating for India Seminar

Dr. CHANDRASEKAR UMAPATHY (PhD, IIM)

OWASP Chennai Chapter LeadSri Lanka OWASP Chapter MentorInvited Trainer at OWASP India conference.Cloud Alliance Security Chennai Chapter Lead.Reviewer of ISACA CRISC Review Manual 2011.Cloud Security Alliance – Control Matrix Co-AuthorISACA Best Trainer for the Year 2011-2012

7

Our IT Security Specialists:-

Dr. THENNARASU.E (Harsha) PhDResearcher Information Security on High End ApplicationsInformation Security Assessment expertMember of DSCI (Data Security Council of India)Trainer Certified Ethical HackerOverseas Auditing ExperienceGuest Lecturing (Universities, Colleges)Guest Speaker of Innovating for India Seminar

Dr. CHANDRASEKAR UMAPATHY (PhD, IIM)

OWASP Chennai Chapter LeadSri Lanka OWASP Chapter MentorInvited Trainer at OWASP India conference.Cloud Alliance Security Chennai Chapter Lead.Reviewer of ISACA CRISC Review Manual 2011.Cloud Security Alliance – Control Matrix Co-AuthorISACA Best Trainer for the Year 2011-2012

Page 8: HK IT Security Consultant Profile

Our IT Security Specialists:-

Mr. RAJENDRANCertified CISP from Dept of IT Govt of IndiaSubject matter expert & Trainer for Tamil Nadu Police academicActive member and the Treasurer of Cyber Society of India.Pursuing PhD in the area of Cyber Crime in BanksMember of Indian Society of Victimology

8

Mr. TS. RAGHUNATHAN,Certified security professional by Cisco, Cyberoam, Watchguard, etc.,Practitioner Information & Network Security assessments/auditsVA/PT specialistCertified Ethical Hacker12 year experience in Information & Network Security Domains

Page 9: HK IT Security Consultant Profile

Benefits by IT Assessments/ Audits

Restructured Operations aligned with business needs

An informed view of organizational security posture

First-hand knowledge about organizational security shortcomings inprocesses and technologies

Increase in confidence levels after getting IT Audited/Assessed

Understanding of benefits with a proactive approach to IT security

Added selling point in offering secured services

Increase in customer confidence levels

Secure information infrastructure aligned with business needs

Justified optimal solutions to provide maximum return on objectives

Improved quality of service due to performance optimization9

Benefits by IT Assessments/ Audits

Restructured Operations aligned with business needs

An informed view of organizational security posture

First-hand knowledge about organizational security shortcomings inprocesses and technologies

Increase in confidence levels after getting IT Audited/Assessed

Understanding of benefits with a proactive approach to IT security

Added selling point in offering secured services

Increase in customer confidence levels

Secure information infrastructure aligned with business needs

Justified optimal solutions to provide maximum return on objectives

Improved quality of service due to performance optimization

Page 10: HK IT Security Consultant Profile

Our Expertise

Page 11: HK IT Security Consultant Profile
Page 12: HK IT Security Consultant Profile

INNOVATING FOR INDIA SEMINAR @ BISHOP COTTON WOMEN’S CHRISTIAN COLLEGEADDRESSED BY Dr. HARSHA, Chief IT Security Advisor

Information Security Training to Vijay Bank, HO

Page 13: HK IT Security Consultant Profile

E-waste Collection Program forsupporting

Senior Citizens

CSR Initiative to generaterevenue for NGO

In partner with

Dignity Foundation

Page 14: HK IT Security Consultant Profile
Page 15: HK IT Security Consultant Profile

Articles – Head Consultant

Page 16: HK IT Security Consultant Profile

Articles – Head Consultant

Page 17: HK IT Security Consultant Profile

Articles – Head Consultant- Feb’ 2013

Page 18: HK IT Security Consultant Profile

Clients

Partners

Thank you IT Consultations@

www.hkit.in