Blog
What is a vCISO?
A virtual chief information security officer (vCISO) is a third-party cybersecurity expert who provides organizations with strategic advice and guidance on information security matters. Typically there are one of three reasons to hire a vCISO: Your company's CISO may...
Welcome to TrustedCISO a vCISO Consulting Company
Hello and welcome to TrustedCISO! I have 30 years of experience in information security. Having been a Chief Information Security Officer (CISO) at RedSeal, Inc, I decided to launch my own vCISO consulting company in 2022. I am experienced in building SOC2 and...
United Healthcare Ransomware Attack
After a debilitating ransomware attack at United Healthcare that has caused some health care providers to lose up to $1 billion a day, the US Office of Health and Human Resources is investigating the hack. United Healthcare paid $22 million to the Russian ransomware...
Over 2 Million Affected by McLaren Healthcare Data Breach
In an era where digital information is king, the recent data breach at McLaren Healthcare serves as a stark reminder of the vulnerability of our personal data. In this incident, over 2 million individuals were impacted, marking it as one of the most significant...
Table Top Exercises for Business Continuity and Incident Response | TrustedCISO
A business continuity or incident response table top is a simulated scenario-based exercise designed to test an organization's ability to respond to a potential crisis or disaster situation. The exercise typically involves a group of key stakeholders and...
SOC2 Audit Services for Cloud and SaaS Providers – Contact TrustedCISO
SOC2 (Service Organization Control 2) has become the de facto audit requirement for the cloud in the commercial space. Whether your company has a SaaS product or you are evaluating a cloud service offering, you need to understand what SOC2 is and how to evaluate a...
Ransomware Attack
Ransomware attacks are not slowing down because it is a profitable business. According to Cybersecurity Ventures, ransomware damages were $20 billion in 2021 and are projected to be $42 billion by 2024.
Securing Cloud Serverless
Here are the best practices for securing cloud serverless architecture: Implement proper access controls: Use identity and access management (IAM) to set up fine-grained permissions for resources and APIs. Secure data in transit and at rest: Encrypt sensitive data and...
Audit Readiness
Put your audit on autopilot. Let TrustedCISO get you prepared for your audit.
vCISO/CSO/CIO
Build a Cyber Fortress with your budget in mind. Strategic secure design from DevOps through Operations.
Advanced Cloud Security
Affordable full cloud visibility, sensitive data exposure, real-time alerts, and auto-remediation.
Contact Us
(246) 462-3523
1234 Divi St. #1000, San Francisco, CA
Monday-Friday: 8am – 5pm
Get Started
Mauris blandit aliquet elit, eget tincidunt nibh pulvinar a. Vestibulum ante ipsum p