Serving Cleveland firms since 1997
Eric is working at JurInnov, Ltd so we are no longer accepting new customers. We hope you understand this decision. It has been a pleasure serving you for the past 10 years. Please visit JurInnov for your security consulting needs.
Company founder, Eric Vanderburg, publishes the article Implementation to Instruction - Is teaching next on your Horizon? in Certification Magazine.
Independent Systems Consulting celebrates its 10 year anniversary. Join us at BW-3 Grill & Pub in Rocky River.
20412 Center Ridge Rd.
Rocky River, Ohio 44116
Independent Systems Consulting helps sponsor the Computer Crime and Surreptitious Attack Seminar at Remington College, Cleveland-West Campus.
The process of understanding, assessing and managing risk is paramount to managing any business. This process can give you the information you need to make decisions on how to control risk according to your business goals and security strategy.
Independent Systems Consulting's experienced security experts will work with you to assess your organization's exposure to information security risk and help you develop a risk management program that using our proven methodology for ongoing analysis, prioritization and treatment. ISC's approach facilitates a dynamic risk management strategy and a framework for increased risk awareness and continuous improvement. Security doesn't end with an assessment and neither do we. We will assist you throughout the security lifecycle so that you can have confidence in the security of your systems. This assessment can address both technical and non-technical controls and business processes and can be used to feed into your compliance processes.
Independent Systems Consulting's information security risk assessment is a key method for identifying and measuring threats, vulnerabilities, and risks to organizations. Eric Vanderburg, IS/IA Architect, describes the process. "We utilize audit and risk studies along with an analysis of business continuity and security plans. This assessment is used to identify technical and business issues that can then be ranked by criticality. With the issues identified and ranked, mitigation strategies are then proposed."
Please contact Eric Vanderburg for details.
|Managed Security Services|
|Information Security Strategy|
|Security Governance - Policies and Procedures|
|Security Awareness Training|
|Business Continuity Consulting|