• LinkedIn Social Icon
  • YouTube Social  Icon
  • Twitter Social Icon

CREDENTIALS

 

_MS, Information Security

_CISSP

_CCIE Security

_Certified Information Privacy Profesional (CIPP/US)

_Cisco Intrusion Prevention Specialist 

_CNSS

_FBI InfraGard

 

(c) 2019 The Knox Corps. All Rights Reserved. 

Incident response is an organized approach to addressing and managing the aftermath of a security breach or attack (also known as an incident). The goal is to handle the situation in a way that limits damage and reduces recovery time and costs. An incident response plan includes a policy that defines, in specific terms, what constitutes an incident and provides a step-by-step process that should be followed when an incident occurs

 

Secure collection and handling of electronic data is essential to every organization. When the security surrounding this information is breached, an immediate and comprehensive response is needed to diagnose, fix and move forward from the problem. Ensuring all executives internally communicate to one designated individual is paramount as the organization attemtps to seal the breach and communicate to the public and specific regulatory community. 

 

If you were breached or suspect the possibility of a breach, please conact us!

Forensic Information
Secure collection and handling of electronic data is essential to every organization. When the security surrounding this information is breached, an immediate and comprehensive response is needed to diagnose, report, fix and advance the problem to a solution. Allow the forensic experts at Knox to trace, assess and report on suspected issues.

FORENSICS

RELATED CASE STUDIES

A Chief Security Officer has the challenge of securing all segments of the business ranging from IT, legal, privacy, compliance, risk, governance and many more. 

The CSO guides the organziation toward regulatory compliance and positions the business to defend against technical and non technical threats. One of the most dangerous threats to businessess today is the governance of the third party vendor and ensuring they are following correct security protocols throughout their business to essentially protect the data of the first party. 

 

Your customers are doing their part in taking part in a firms core products and services. While the customer engages with firms, there is information that is taken from them in order to enhance their experience. The customer is entrusting firms to hold up their end of the bargain and protect their identities during this enchange.