CTOs on the Move

LMGholdings

www.lmgholdings.com

 
LMG Holdings, provides ignition interlock systems that allow individuals and the public to avoid the tragic and life altering consequences of drinking and driving.
  • Number of Employees: 250-1000
  • Annual Revenue: $100-250 Million

Executives

Name Title Contact Details

Similar Companies

Contech Group

Contech Group is a Pompton Plains, NJ-based company in the Computers and Electronics sector.

Epitome Networks

Epitome Networks is a Henrico, VA-based company in the Computers and Electronics sector.

Retail Zipline

Zipline helps retailers coordinate their brick-and-mortar stores by streamlining communications between HQ and the field. By easily centralizing and personalizing messages, retailers boost accountability and employee engagement.

SecZetta

SecZetta is the leading provider of non-employee risk and lifecycle management. SecZettas`​ solutions are utilized by companies around the globe to manage non-employee identity risk: create, control and respond to third party identity requirements and processes, meet compliance and minimize data breaches.

Halock Security Labs

HALOCK is a U.S.-based information security consultancy that is privately owned and operated out of its headquarters in Schaumburg, IL since 1996. From mid-sized to the Fortune 100, HALOCK`s clients span many industries including financial services, healthcare, legal, education, energy, SaaS/cloud, enterprise retail, and more. HALOCK is your security partner, providing both strategic and technical security offerings by combining strong thought leadership, diagnostic capabilities, and deep technical expertise with a proven ability to get things done. HALOCK helps clients prioritize and optimize their security investments by applying just the right amount of security to protect critical business assets while satisfying compliance requirements and corporate goals. HALOCK Security Labs and CIS (Center for Internet Security) have co-developed the CIS Risk Assessment Method (RAM) to help organizations find their balance between security and business while evaluating and implementing the CIS Controls. CIS RAM helps organizations define their acceptable level of risk, and determine whether their use of the CIS Controls is risk-appropriate. This method is the first to be based on the Duty of Care Risk Analysis Standard (DoCRA) to help organizations evaluate cyber risk in a way that is clear to legal authorities, regulators, executives, lay people, and security practitioners. DoCRA establishes reasonable security. CIS RAM is an information security risk assessment method that helps organizations design and evaluate their implementation of the CIS Controls. CIS RAM provides instructions, examples, templates, and exercises for conducting risk assessments. And because CIS RAM is based on the DoCRA Standard, its risk assessments meet the requirements of established information security risk assessment standards and demonstrate whether safeguards are `reasonable` and `appropriate` as regulators and judges often require.