Find a mapping of CISO Management Directives and Department CategFories Doug Knehr, Esq., MBA, CISSP, CIPM, CIPP CISO Management Directives – Doug Knehr 609-635-2226 Copyright Doug@DougKnehr
Below find a link to my evidence based approach for mapping critical infrastructure requirements. Frameworks Mapped to Vendors – Doug Knehr (c) Doug@DougKnehr 609-635-2226 Doug@DougKnehr.com Douglas S. Knehr, Esq.,MBA, CISSP, CIPM, CIPP Doug@DougKnehr.com M: […]
Click the link below to review my recent research into cloud service negotiation considerations. Cloud Related Security and Negotiations – Doug Knehr (c) 609-635-2226
Certified Ethical Hacker -PEN Testing methodologies I have been rounding out my cyber security skill sets, including ethical hacking. Find a sample of some methodology thought in the above link.
Cyber Security Information Sharing Cyber Security Information Sharing 2016 – Douglas S Knehr 6096352226
Cyber War Gaming For International Organizations Contact me to discuss leading cyber war gaming scenarios beginning with table top exercises by department leading to cross department functions. Douglas S. Knehr, Esq.,MBA, CISSP, CIPM, CIPP Doug@DougKnehr.com M: 609-635-2226 Stetson […]
Regulation SCI (Systems Compliance and Integrity) Click on the above link for a condensed view of my deep research and expertise in Regulation SCI (Systems Compliance and Integrity) covering the following areas: types of entities […]