Course Service

Cybersecurity Review

In this follow-up consultation, we will review specific areas in your environment to determine alignment with best practices and the organization's risk strategy. The focus will be on cybersecurity architecture, design, and implementation. This service allocates 8 hours over the course of 1-2 weeks with 1-4 hours per session. Expert advice will be given during this service with deliverables including a technical and/or executive report detailing findings and recommendations. Please schedule a Discovery Call before this service.
Tags
Cybersecurity Consultation Cybersecurity Review Security Audit Risk Consultation Information Security Cloud Security Zero Trust Architecture Risk Management Microsoft Azure
Book an Online Meeting with Alexander Ciudinovschi

Buy Course

Lesson Length: 60 Min
Total Lessons in Course: 8

For all courses, calls with this provider are scheduled via Calendar page after purchase.

Alexander Ciudinovschi

Cloud Security Architect

The modern cloud brings opportunities to improve or wholly comprise an organization's digital estate. To fully harness these technologies, businesses require both an efficient and secure architectu... Read More
verified icon

Verified

Benefits

benefit checkmark icon
Receive expert advice on modern cloud opportunities and solutions
benefit checkmark icon
Gain insights into cybersecurity best practices and industry standards
benefit checkmark icon
Identify strategies to improve digital estate and security posture
benefit checkmark icon
Discover ways to integrate cyber risk management into business strategy
benefit checkmark icon
Learn about zero trust architecture and how to implement it into information systems
benefit checkmark icon
Receive an actionable report for improving business technology assets and risk management

Frequently Asked Questions

Technical operators and system owners should be on these calls to gain the most understanding during a guided review. Management and decision makers are welcome to join for technical insight into their environment, though are only required during initial scoping.

Security policies, cloud environments, third-party applications/platforms, network access controls, identity & access mangement, and other risk-impacting assets can be included in the scope of this consultation.

Depending on the specific solution, and my own experience with it and similar products, I will offer advice on best practices and implementations. I have worked with a broad range of tools and technologies, and can give expert advice on those with which I am familiar, and more general advice on other relevant solutions. My background is primarily with Windows and Azure ecosystems, and oranizations with those systems will gain the most value from my services.

I am a Certified Information Systems Security Professional (CISSP), a Microsoft Certified Cybersecurity Architect, and a Microsoft Certified Azure Security Engineer. I also hold a Bachelor's of Science in Cybersecurity from the University of Cincinnati.
Loading...
no learn more icon

This provider doesn't have any quotes yet.