| Name | Title | Contact Details |
|---|---|---|
Chris Brenes |
Chief Information Security Officer | Profile |
I2b Networks, Inc is a San Diego, CA-based company in the Computers and Electronics sector.
Segra is one of the largest independent fiber infrastructure bandwidth companies in the Eastern U.S. It owns and operates an advanced fiber infrastructure network throughout nine Mid-Atlantic and Southeastern states. Segra provides Ethernet, MPLS, dark fiber, advanced data center services, IP and managed services, voice and cloud solutions, all backed by its industry-leading service and reliability. Customers include carriers, enterprises, governments, and healthcare organizations.
Solutionary reduces the information security and compliance burden, delivering flexible managed security services that align with client goals, enhancing organizations’ existing security program, infrastructure and personnel. The company’s services are based on experienced security professionals, actionable threat intelligence and the ActiveGuard service platform that provide expert security and compliance management. Solutionary works as an extension of clients’ internal teams, providing industry-leading customer service, patented technology, thought leadership, years of innovation and proprietary certifications that exceed industry standards. This client focus and dedication to customer service has enabled Solutionary to boast one of the highest client retention rates in the industry.
Inspira Enterprise embraces technology and applies Digital Transformation as-a-Service model to accelerate digitization and revamp the customer experience across various business verticals. Inspira embarks its digital transformation journey with service excellence in cybersecurity consulting, managed security services, managed networking services, data analytics and cloud services. Over the years, Inspira has achieved transformational goals with a team of over 1600+ professionals, successfully deploying next-gen digital transformation solutions across India, U.S.A, Asia, and MEA regions. The Eminent Advisors are CISOs of the largest consultancies, and global systems integrators like Microsoft, Columbia University etc. Being a cyber security augmented organization, Inspira laterally has a unified Threat & Vulnerability Management (TVM) SaaS Platform, powered by iSMART2. The USP of the security solution lies in Threat Vulnerability and Application Security coming together in a single box. Also, Inspira has achieved milestones one after other - Being listed under the Next Fortune 500 Largest Emerging Companies 2022, is honored to be a CERT-IN empaneled security auditing organization, and being acknowledged with the 2022 EMEA Emerging Partner of the Year Award at 2022 Splunk Global Partner Awards. Connect with Inspira to build a flexible framework for IT orchestration and strengthen core business security with best-in-class cybersecurity solutions.
HALOCK is a U.S.-based information security consultancy that is privately owned and operated out of its headquarters in Schaumburg, IL since 1996. From mid-sized to the Fortune 100, HALOCK`s clients span many industries including financial services, healthcare, legal, education, energy, SaaS/cloud, enterprise retail, and more. HALOCK is your security partner, providing both strategic and technical security offerings by combining strong thought leadership, diagnostic capabilities, and deep technical expertise with a proven ability to get things done. HALOCK helps clients prioritize and optimize their security investments by applying just the right amount of security to protect critical business assets while satisfying compliance requirements and corporate goals. HALOCK Security Labs and CIS (Center for Internet Security) have co-developed the CIS Risk Assessment Method (RAM) to help organizations find their balance between security and business while evaluating and implementing the CIS Controls. CIS RAM helps organizations define their acceptable level of risk, and determine whether their use of the CIS Controls is risk-appropriate. This method is the first to be based on the Duty of Care Risk Analysis Standard (DoCRA) to help organizations evaluate cyber risk in a way that is clear to legal authorities, regulators, executives, lay people, and security practitioners. DoCRA establishes reasonable security. CIS RAM is an information security risk assessment method that helps organizations design and evaluate their implementation of the CIS Controls. CIS RAM provides instructions, examples, templates, and exercises for conducting risk assessments. And because CIS RAM is based on the DoCRA Standard, its risk assessments meet the requirements of established information security risk assessment standards and demonstrate whether safeguards are `reasonable` and `appropriate` as regulators and judges often require.