top of page

   Cyber (Data Security)

 

  • Drafting and negotiating contracts and master services agreements (MSAs) related to various security services, such as advanced persistent threat detection, antimalware engineering, antivirus engineering, application security assessment, artificial intelligence engineering, behavioral analytics, blockchain consulting, bot engineering, click-through engineering, cloud security assessment, co-location, computer engineering, cookie mitigation, credential misuse mitigation, critical infrastructure security assessment, cross-site scripting attack mitigation, cyber insurance, data analytics, data center operations, data leakage mitigation, data loss prevention, data management, database administration, dedicated internet access assessment, denial of service mitigation, digital currency consulting, disaster recovery services, distributed denial of service mitigation, drive-by attack mitigation, eCommerce consulting, electronics engineering, email security assessment, employee screening, employee training, encryption engineering, enterprise architecture assessment, eavesdropping attack mitigation, firewall engineering, graphic user interface (GUI) design, hardware consulting, identity and access management, incident response management, information security assessment, information systems consulting, infrastructure as a service (IaaS), insider threat investigation, intranet security assessment, intrusion detection systems, intrusion prevention systems, man-in-the-middle attack mitigation, mechatronics engineering, microelectronics engineering, nanotechnology engineering, network security assessment, pay-per-click engineering, reputational risk management, risk and compliance management, password attack mitigation, perimeter security assessment, penetration testing, phishing attack mitigation, ransomware mitigation, robotics engineering, scraping mitigation, search engine optimization (SEO), security assessment, security testing, session hacking mitigation, social engineering mitigation, social media influencer screening, social media security assessment, software as a service (SaaS), software engineering, software management, SQL injection attack mitigation, systems integration, threat detection management, tracking detection, unified threat management, user experience (UX) design, vulnerability assessment, web filtering, web hosting, web scraping mitigation, web security assessment, website design, wi-fi security assessment.

  • Drafting and negotiating contracts and master services agreements (MSAs) related to various managed security services (MSSs), such as cloud-based security information and event management (SIEM), managed detection and response (MDR), managed endpoint security as a service (MEPSaaS), managed security service provider (MSSP), security intelligence, security operations center (SOC) as a service (SOCaaS), virtual chief information security officer (VCISO).

    Last updated 200614_1958

bottom of page