Efficient management systems are more important now than ever. In this new world where digital transformation, cloud computing, remote working and a sophisticated threat landscape, traditional task management and manual reporting will not set your security team up for success.
I have been working for the past 20 years as a security consultant for management systems and reporting solutions in the InfoSec industry. My experience in analysing, building, managing and documenting management systems is extensive. From on-boarding and coaching new teams to implementing global custom business solutions, I work closely with enterprise clients to produce measurable improvements in team efficiencies and productivity.
There are many ways I can help. The request can be as specific as coming up with solutions for automated management reports or navigating a more complex problem such as improving efficiencies on 24/7 security operations and scaling that on a global scale. Whatever your business’ challenges are, let’s talk.
Efficient management systems are more important now than ever. In this new world where digital transformation, cloud computing, remote working and a sophisticated threat landscape, traditional task management and manual reporting will not set your security team up for success.
I have been working for the past 20 years as a security consultant for management systems and reporting solutions in the InfoSec industry. My experience in analysing, building, managing and documenting management systems is extensive. From on-boarding and coaching new teams to implementing global custom business solutions, I work closely with enterprise clients to produce measurable improvements in team efficiencies and productivity.
There are many ways I can help. The request can be as specific as coming up with solutions for automated management reports or navigating a more complex problem such as improving efficiencies on 24/7 security operations and scaling that on a global scale. Whatever your business’ challenges are, let’s talk.
Application security processes such as web application inventory review
and penetration test processes
Vulnerability management processes
Endpoint security and device patching processes
Network security processes including regular firewall review
Cloud management security posture processes
Incident management and response processes such as playbooks for key
scenarios and on-call systems
General risk management processes such as BIA, new third parties, new
projects and risk register updates
Change management processes
PRODUCTIVITY MANAGEMENT
Audits of your current processes
Development of action plans and prioritisation of implementation steps
Team trainings and practical workshops
Process tracking and automations
Benchmarking team performance against clear KPIs
Implementations of standard operating procedures
Management reporting
Knowledge base creation and management
TASK MANAGEMENT
JIRA Software
JIRA Service
JIRA Align
ServiceNow
Confluence
TALK TO
ALEX BACER - SECURITY PROCESS CONSULTANT
Security operations are only as good as the quality of its processes. The first step to finding out if your organisation is equipped to deal with cyberthreats starts here.
Today, in the midst of a ravaging pandemic, business entities have been increasingly adopting virtual workplaces and virtual workforce solutions. Hence, enterprises globally are feeling a pressing need for hiring a virtual CISO (vCISO). Moreover, the focused efforts from a vCISO, his exp...
Cubic Consulting is a cybersecurity company based in Luxembourg. We bring our years of global real-world expertise to companies of all sizes.