Chief Information Security Officer

My core competencies include IT operations, IT service management, IT management, and information security. I have successfully developed and led cohesive teams across different time zones and languages, using a culture of understanding, empathy, and support. My mission is to enable and empower my team and organization to achieve their goals and deliver value to their stakeholders.

benefits-of-a-vciso

Benefits of a vCISO

As cyber threats continue escalating and regulatory pressures grow, many organizations need high-level security leadership without the resources or timing

Read More »

Dark Web Monitoring: Tracks stolen data and threats on the dark web for proactive mitigation.

3rd Party Risk Review: Assesses security risks posed by vendors and partners.

PCI DSS Scan: Evaluates compliance with Payment Card Industry Data Security Standards.

Vulnerability Scan: Automated scan identifying weaknesses in systems, software, and configurations.

Phishing Simulations: Mock phishing attacks to assess employee susceptibility and improve detection of malicious emails.

Penetration Testing: Simulated attacks to identify and exploit vulnerabilities in systems before malicious actors can.

Security Awareness Training: Educates employees on recognizing and avoiding cyber threats through interactive lessons and real-world scenarios.