Name | Title | Contact Details |
---|---|---|
Sean Pearcy |
Sr. Director of Cybersecurity Services | Profile |
CineForm is a Solana Beach, CA-based company in the Computers and Electronics sector.
BLOCKv provides interface protocol overlay on blockchains – the layer necessary to unleash exponential mainstream adoption. BLOCKv enables the rapid development and distribution of interactive smart objects – “experiential currency” – that interact with the end user.
Enavate transforms businesses and the lives they touch. To us, it`s personal. Our consulting, Cloud and managed IT support services enable key decision-makers focus on their organization`s overall mission and vision, knowing that the day-to-day operations are under control. Clients in the distribution, manufacturing and professional services industries rely on our implementation expertise to improve processes, boost efficiency and stimulate agility in an ever-changing business climate. Enavate is a Microsoft Gold and NetSuite Solution Provider.
TROI IT Solutions is a Spokane, WA-based company in the Computers and Electronics sector.
HALOCK is a U.S.-based information security consultancy that is privately owned and operated out of its headquarters in Schaumburg, IL since 1996. From mid-sized to the Fortune 100, HALOCK`s clients span many industries including financial services, healthcare, legal, education, energy, SaaS/cloud, enterprise retail, and more. HALOCK is your security partner, providing both strategic and technical security offerings by combining strong thought leadership, diagnostic capabilities, and deep technical expertise with a proven ability to get things done. HALOCK helps clients prioritize and optimize their security investments by applying just the right amount of security to protect critical business assets while satisfying compliance requirements and corporate goals. HALOCK Security Labs and CIS (Center for Internet Security) have co-developed the CIS Risk Assessment Method (RAM) to help organizations find their balance between security and business while evaluating and implementing the CIS Controls. CIS RAM helps organizations define their acceptable level of risk, and determine whether their use of the CIS Controls is risk-appropriate. This method is the first to be based on the Duty of Care Risk Analysis Standard (DoCRA) to help organizations evaluate cyber risk in a way that is clear to legal authorities, regulators, executives, lay people, and security practitioners. DoCRA establishes reasonable security. CIS RAM is an information security risk assessment method that helps organizations design and evaluate their implementation of the CIS Controls. CIS RAM provides instructions, examples, templates, and exercises for conducting risk assessments. And because CIS RAM is based on the DoCRA Standard, its risk assessments meet the requirements of established information security risk assessment standards and demonstrate whether safeguards are `reasonable` and `appropriate` as regulators and judges often require.