SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
Company Overview:

 •   Organizational History
 •   What We Do
 •   How We Do It
 •   Assessment Services
 •   Consulting Services
 •   Compliance Services
                                    Your Security. Our Passion.
 •   Description of Professionals
 •   Client Profiles


www.FRSecure.com | 952-442-1709
Organizational History
 FRSecure is a full-service information security consulting company.

 The company was established in the spring of 2008 by a group of
 seasoned information security professionals who sought to provide
 the type of consultant “we wished we had when we were building
 and managing our own information security programs”.




www.FRSecure.com | 952-442-1709
What We Do

 As an information security consulting company, we help businesses
 find and fix vulnerabilities.

 "Information Security“ Defined:

     •   Information - your intangible assets. People usually assume this means data, which it does,
         but it also includes hard copy information and the stuff in your head. Basically, think about
         any information that if you lost it your business would suffer. That's what we protect.

     •   Security - keeping that information confidential, accurate, and available.




www.FRSecure.com | 952-442-1709
How We Do It
 We focus on security in 5 major areas:
                                                                    Policy and
                                                                    Procedures

 • Administrative Security
      •   Policy & procedure
                                                                                           External
      •   Sometimes called General Controls   Physical
                                                                                              IT
                                              Security
 •   Physical Security                                              Core                   Security


 •   External IT Security
 •   Internal IT Security
                                                                    Data
 •   Application Security
                                                         Software                Internal IT
                                                         Security                 Security




www.FRSecure.com | 952-442-1709
How We Do It

 We perform assessments of your security in those five areas. If we
 find problems, we report them to you along with our
 recommendations on how they can be resolved.

 Should you need or want help resolving those issues, we do that
 through our consulting services.




www.FRSecure.com | 952-442-1709
Assessment Services
 We perform the following types of assessments:

     •   Information Security
     •   Compliance
     •   Administrative (General) Controls
     •   Physical Security
     •   Internal Network Security
     •   External Network Security
     •   Application Security
     •   Small Business Security



www.FRSecure.com | 952-442-1709
Consulting Services
 FRSecure offers security consulting services such as:

     •   Security Health Checkup
     •   Outsourced Security Program Design and Development
     •   Vendor Risk Management
     •   Penetration Testing
     •   Policy Creation
     •   SAS70/SSAE16 Readiness
     •   BC/DR Planning and Testing
     •   Incident Response
     •   And much more…


www.FRSecure.com | 952-442-1709
Compliance Services
 FRSecure offers the following compliance solutions:

     •   Financial Services Compliance Solutions (GLBA/FFIEC and FinCEN)
     •   Healthcare Compliance Solutions (HIPAA)
     •   Utilities Compliance Solutions (NERC CIP)
     •   Education Compliance Solutions (FERPA)
     •   Government Compliance Solutions (FISMA, NIST, and FIPS)
     •   Payment Card Industry Compliance Solutions (PCI)
     •   ISO/IEC 27001 Compliance
     •   ISO/IEC 27036 Compliance
     •   Customer Compliance


www.FRSecure.com | 952-442-1709
Description of Professionals
 All information security professionals working for FRSecure have, at a minimum:
     •   A valid, and active Certified Information Security Systems Professional (“CISSP”)
         certification,
     •   Real-world information security experience; building, managing, and improving information
         security programs for which they have been directly responsible for,
     •   An average more than 10 years of information security practitioner experience, and;
     •   A passion for helping clients solve information security challenges.


 Additionally, FRSecure’s professionals have real-world experience working in and
 for a wide range of organizations; from the Fortune 500 to the small community
 bank, and everything in between.




www.FRSecure.com | 952-442-1709
Client Profiles
 FRSecure has worked with hundreds of organizations ranging in size from 5 to
 more than 250,000 employees; both publicly and privately-owned. Some of the
 more notable organizations include Wells Fargo, U.S. Bank, UnitedHealth Group,
 ADP, ADC, First Data, and Eisai.

 Although FRSecure has extensive experience working with organizations of all
 sizes, we specialize in working with organizations that fit the following profile:
     •   Organizations with less than 10,000 employees
     •   Organizations with compliance, intellectual property protection, and/or customer-specific
         security needs
     •   Organizations with a need to compliment in-house information security expertise
     •   Organizations with information security budget constraints
     •   Organizations that require or prefer an independent opinion or review



www.FRSecure.com | 952-442-1709

Weitere ähnliche Inhalte

Was ist angesagt?

Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policycharlesgarrett
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...PECB
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security FrameworkNada G.Youssef
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...PECB
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governancenooralmousa
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by SripathiPrajwal Panchmahalkar
 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.IGN MANTRA
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1Tanmay Shinde
 
Information security group presentation ppt
Information security group presentation   pptInformation security group presentation   ppt
Information security group presentation pptvaishalshah01
 
Information Security Fundamentals
Information Security FundamentalsInformation Security Fundamentals
Information Security FundamentalsThe Avi Sharma
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...Arbp Worldwide
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security ProgramRaymond Cunningham
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionGianmarco Ferri
 
ISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness TrainingISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness Traininghimalya sharma
 

Was ist angesagt? (20)

Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
 
Become CISSP Certified
Become CISSP CertifiedBecome CISSP Certified
Become CISSP Certified
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by Sripathi
 
Information Security
Information SecurityInformation Security
Information Security
 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1
 
Information security group presentation ppt
Information security group presentation   pptInformation security group presentation   ppt
Information security group presentation ppt
 
Information Security Fundamentals
Information Security FundamentalsInformation Security Fundamentals
Information Security Fundamentals
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
IT compliance
IT complianceIT compliance
IT compliance
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtection
 
ISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness TrainingISO 27001 Training | ISMS Awareness Training
ISO 27001 Training | ISMS Awareness Training
 

Andere mochten auch

Iping, england (team 5) website presentation rough draft
Iping, england (team 5) website presentation rough draftIping, england (team 5) website presentation rough draft
Iping, england (team 5) website presentation rough draftKKmck
 
Tatjana Aparac-Jelušić, Lucija Žilić, Jelena Šatalić Krstić: Marketing digiti...
Tatjana Aparac-Jelušić, Lucija Žilić, Jelena Šatalić Krstić: Marketing digiti...Tatjana Aparac-Jelušić, Lucija Žilić, Jelena Šatalić Krstić: Marketing digiti...
Tatjana Aparac-Jelušić, Lucija Žilić, Jelena Šatalić Krstić: Marketing digiti...KISK FF MU
 
Delphi ppt
Delphi pptDelphi ppt
Delphi pptgulitaap
 
Chevron Case: Re 25 - Public - Short Expert Report (nov. 7, 2014)
Chevron Case: Re 25 - Public - Short Expert Report (nov. 7, 2014)Chevron Case: Re 25 - Public - Short Expert Report (nov. 7, 2014)
Chevron Case: Re 25 - Public - Short Expert Report (nov. 7, 2014)Embajada del Ecuador en USA
 
Changes to our horror opening
Changes to our horror openingChanges to our horror opening
Changes to our horror openingjackfowler16
 
Magdalena Petryna, Wstęp do numeru, Przestrzenie wirtualne
Magdalena Petryna, Wstęp do numeru, Przestrzenie wirtualneMagdalena Petryna, Wstęp do numeru, Przestrzenie wirtualne
Magdalena Petryna, Wstęp do numeru, Przestrzenie wirtualneMałopolski Instytut Kultury
 
Opening Statement - SMA Kenneth
Opening Statement - SMA Kenneth Opening Statement - SMA Kenneth
Opening Statement - SMA Kenneth Military Matters
 
VirtualBox
VirtualBoxVirtualBox
VirtualBoxigustin
 
Michael faraday
Michael faradayMichael faraday
Michael faradayMary Valy
 
Geopolitical intelligence analysis
Geopolitical intelligence analysisGeopolitical intelligence analysis
Geopolitical intelligence analysisG3 intelligence Ltd
 

Andere mochten auch (17)

VENEZUELA 2015
VENEZUELA 2015VENEZUELA 2015
VENEZUELA 2015
 
Ethics
EthicsEthics
Ethics
 
Iping, england (team 5) website presentation rough draft
Iping, england (team 5) website presentation rough draftIping, england (team 5) website presentation rough draft
Iping, england (team 5) website presentation rough draft
 
Tatjana Aparac-Jelušić, Lucija Žilić, Jelena Šatalić Krstić: Marketing digiti...
Tatjana Aparac-Jelušić, Lucija Žilić, Jelena Šatalić Krstić: Marketing digiti...Tatjana Aparac-Jelušić, Lucija Žilić, Jelena Šatalić Krstić: Marketing digiti...
Tatjana Aparac-Jelušić, Lucija Žilić, Jelena Šatalić Krstić: Marketing digiti...
 
Delphi ppt
Delphi pptDelphi ppt
Delphi ppt
 
Chevron Case: Re 25 - Public - Short Expert Report (nov. 7, 2014)
Chevron Case: Re 25 - Public - Short Expert Report (nov. 7, 2014)Chevron Case: Re 25 - Public - Short Expert Report (nov. 7, 2014)
Chevron Case: Re 25 - Public - Short Expert Report (nov. 7, 2014)
 
001 surah al-alaq (the embryo)
001  surah al-alaq (the embryo)001  surah al-alaq (the embryo)
001 surah al-alaq (the embryo)
 
Changes to our horror opening
Changes to our horror openingChanges to our horror opening
Changes to our horror opening
 
Magdalena Petryna, Wstęp do numeru, Przestrzenie wirtualne
Magdalena Petryna, Wstęp do numeru, Przestrzenie wirtualneMagdalena Petryna, Wstęp do numeru, Przestrzenie wirtualne
Magdalena Petryna, Wstęp do numeru, Przestrzenie wirtualne
 
Opening Statement - SMA Kenneth
Opening Statement - SMA Kenneth Opening Statement - SMA Kenneth
Opening Statement - SMA Kenneth
 
HOW TO BRAND WITH SOCIAL MEDIA MARKETING
HOW TO BRAND WITH SOCIAL MEDIA MARKETINGHOW TO BRAND WITH SOCIAL MEDIA MARKETING
HOW TO BRAND WITH SOCIAL MEDIA MARKETING
 
VirtualBox
VirtualBoxVirtualBox
VirtualBox
 
Michael faraday
Michael faradayMichael faraday
Michael faraday
 
Colheitadeiras de Café, hastes
Colheitadeiras de Café, hastesColheitadeiras de Café, hastes
Colheitadeiras de Café, hastes
 
Geopolitical intelligence analysis
Geopolitical intelligence analysisGeopolitical intelligence analysis
Geopolitical intelligence analysis
 
another ppt
another pptanother ppt
another ppt
 
UBL ppt On Terrorism and Risk
UBL ppt On Terrorism and Risk UBL ppt On Terrorism and Risk
UBL ppt On Terrorism and Risk
 

Ähnlich wie FRSecure Company Overview

FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales DeckEvan Francen
 
Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT IssueEvan Francen
 
Information Security in a Compliance World
Information Security in a Compliance WorldInformation Security in a Compliance World
Information Security in a Compliance WorldEvan Francen
 
Information Security For Leaders, By a Leader
Information Security For Leaders, By a LeaderInformation Security For Leaders, By a Leader
Information Security For Leaders, By a LeaderEvan Francen
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environmentEvan Francen
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting OverviewRonan Martin
 
Ttss consulting(1)
Ttss consulting(1)Ttss consulting(1)
Ttss consulting(1)Steven Trom
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
IS3 Capabilities Brief
IS3 Capabilities BriefIS3 Capabilities Brief
IS3 Capabilities Briefmrsjennbrown
 
Security For Free
Security For FreeSecurity For Free
Security For Freegwarden
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSOSagarNegi10
 
Is3 Capabilities Brief
Is3 Capabilities BriefIs3 Capabilities Brief
Is3 Capabilities Briefmageeb
 

Ähnlich wie FRSecure Company Overview (20)

FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales Deck
 
Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT Issue
 
Information Security in a Compliance World
Information Security in a Compliance WorldInformation Security in a Compliance World
Information Security in a Compliance World
 
Information Security For Leaders, By a Leader
Information Security For Leaders, By a LeaderInformation Security For Leaders, By a Leader
Information Security For Leaders, By a Leader
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environment
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Trofi Security Service Catalogue (1)
Trofi Security Service Catalogue (1)Trofi Security Service Catalogue (1)
Trofi Security Service Catalogue (1)
 
c~Sharpe Security Services
c~Sharpe Security Servicesc~Sharpe Security Services
c~Sharpe Security Services
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting Overview
 
Ttss consulting(1)
Ttss consulting(1)Ttss consulting(1)
Ttss consulting(1)
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
IT Security Strategy
IT Security StrategyIT Security Strategy
IT Security Strategy
 
IT Security Strategy
IT Security StrategyIT Security Strategy
IT Security Strategy
 
IS3 Capabilities Brief
IS3 Capabilities BriefIS3 Capabilities Brief
IS3 Capabilities Brief
 
Security For Free
Security For FreeSecurity For Free
Security For Free
 
Cyber security infotech profile
Cyber security infotech profileCyber security infotech profile
Cyber security infotech profile
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
Is3 Capabilities Brief
Is3 Capabilities BriefIs3 Capabilities Brief
Is3 Capabilities Brief
 

FRSecure Company Overview

  • 1. Company Overview: • Organizational History • What We Do • How We Do It • Assessment Services • Consulting Services • Compliance Services Your Security. Our Passion. • Description of Professionals • Client Profiles www.FRSecure.com | 952-442-1709
  • 2. Organizational History FRSecure is a full-service information security consulting company. The company was established in the spring of 2008 by a group of seasoned information security professionals who sought to provide the type of consultant “we wished we had when we were building and managing our own information security programs”. www.FRSecure.com | 952-442-1709
  • 3. What We Do As an information security consulting company, we help businesses find and fix vulnerabilities. "Information Security“ Defined: • Information - your intangible assets. People usually assume this means data, which it does, but it also includes hard copy information and the stuff in your head. Basically, think about any information that if you lost it your business would suffer. That's what we protect. • Security - keeping that information confidential, accurate, and available. www.FRSecure.com | 952-442-1709
  • 4. How We Do It We focus on security in 5 major areas: Policy and Procedures • Administrative Security • Policy & procedure External • Sometimes called General Controls Physical IT Security • Physical Security Core Security • External IT Security • Internal IT Security Data • Application Security Software Internal IT Security Security www.FRSecure.com | 952-442-1709
  • 5. How We Do It We perform assessments of your security in those five areas. If we find problems, we report them to you along with our recommendations on how they can be resolved. Should you need or want help resolving those issues, we do that through our consulting services. www.FRSecure.com | 952-442-1709
  • 6. Assessment Services We perform the following types of assessments: • Information Security • Compliance • Administrative (General) Controls • Physical Security • Internal Network Security • External Network Security • Application Security • Small Business Security www.FRSecure.com | 952-442-1709
  • 7. Consulting Services FRSecure offers security consulting services such as: • Security Health Checkup • Outsourced Security Program Design and Development • Vendor Risk Management • Penetration Testing • Policy Creation • SAS70/SSAE16 Readiness • BC/DR Planning and Testing • Incident Response • And much more… www.FRSecure.com | 952-442-1709
  • 8. Compliance Services FRSecure offers the following compliance solutions: • Financial Services Compliance Solutions (GLBA/FFIEC and FinCEN) • Healthcare Compliance Solutions (HIPAA) • Utilities Compliance Solutions (NERC CIP) • Education Compliance Solutions (FERPA) • Government Compliance Solutions (FISMA, NIST, and FIPS) • Payment Card Industry Compliance Solutions (PCI) • ISO/IEC 27001 Compliance • ISO/IEC 27036 Compliance • Customer Compliance www.FRSecure.com | 952-442-1709
  • 9. Description of Professionals All information security professionals working for FRSecure have, at a minimum: • A valid, and active Certified Information Security Systems Professional (“CISSP”) certification, • Real-world information security experience; building, managing, and improving information security programs for which they have been directly responsible for, • An average more than 10 years of information security practitioner experience, and; • A passion for helping clients solve information security challenges. Additionally, FRSecure’s professionals have real-world experience working in and for a wide range of organizations; from the Fortune 500 to the small community bank, and everything in between. www.FRSecure.com | 952-442-1709
  • 10. Client Profiles FRSecure has worked with hundreds of organizations ranging in size from 5 to more than 250,000 employees; both publicly and privately-owned. Some of the more notable organizations include Wells Fargo, U.S. Bank, UnitedHealth Group, ADP, ADC, First Data, and Eisai. Although FRSecure has extensive experience working with organizations of all sizes, we specialize in working with organizations that fit the following profile: • Organizations with less than 10,000 employees • Organizations with compliance, intellectual property protection, and/or customer-specific security needs • Organizations with a need to compliment in-house information security expertise • Organizations with information security budget constraints • Organizations that require or prefer an independent opinion or review www.FRSecure.com | 952-442-1709