Independent
Systems
Consulting
Serving Cleveland firms since 1997
Eric is working at JurInnov, Ltd so we are no longer accepting new customers. We hope you understand this decision. It has been a pleasure serving you for the past 10 years. Please visit JurInnov for your security consulting needs.
Company founder, Eric Vanderburg, publishes the article Implementation to Instruction - Is teaching next on your Horizon? in Certification Magazine.
Independent Systems Consulting celebrates its 10 year anniversary. Join us at BW-3 Grill & Pub in Rocky River.
20412 Center Ridge Rd.
Rocky River, Ohio 44116
Independent Systems Consulting helps sponsor the Computer Crime and Surreptitious Attack Seminar at Remington College, Cleveland-West Campus.
Defining, implementing and overseeing an organization's security roadmap is a crucial piece of any business. Independent Systems Consulting's security consultants have been helping clients to ensure standardization and compliance within their organizations. With our "Virtual CSO" approach, one of our highly experienced consultants will visit with your senior management team to review, plan and strategize your IT environment.
Ian Ceicys, Lead Consultant, explains:
"We at Independent Systems Consulting help our customers align their business strategy to the appropriate security strategy by identifying key business drivers and translating them to a strategic plan, often including data and application policies in addition to common strategic elements."
After defining the requirements, we map them to various technical requirements and organizational models to develop a strategic vision for organizational security. Typically, the strategy identifies the current and future requirements for information assurance, technical and organizational issues that must be addressed to maximize efficiency while maintaining specified levels of security, and the long-term approach to support business growth and changing threats to information assurance.
Following the strategy, a risk assessment is usually performed. Learn about our risk assessment services.
Managed Security Services | ||
Information Security Strategy | ||
Risk Assessment | ||
Security Governance - Policies and Procedures | ||
Security Awareness Training | ||
Business Continuity Consulting | ||
  |