Lowering business risk via cloud security
A cloud DNA helps take you to a whole new level as you bring security and compliance together (think peanut butter and chocolate!).
With great success, your organization gets discretionary free time back on your side, which is where your true wealth really lies. After all, you can always make more money, but you can never really make more time. And our services are specifically designed to bring you that exponential value in days, rather than months or even years.
Unlike others out there, I am not all over the place. Rather, I am a cloud security expert and that’s what I set out do better for you than anyone else.
eZ Governance Risk & Compliance (GRC) with a flair for the Generation Z crowd who want more than just a compliance program.
Helping you DEMONSTRATE MEANINGFUL VALUE AND RESULTS from your InfoSec program,
better than any of your competitors,
enabling even better business opportunities.
ZecurityAscent is changing the way organizations look at their information security program...for the better.
Based in Atlanta as a veteran-owned (USAF - Aim High!) organization and with the experience of top Fortune information security leadership, I am a recognized expert who always focus on customer value as the only acceptable outcome.
I don't bill by the hour because I simply don't see the point in doing in 10 steps/hours what can be done in 2. And I only take on a few active partner clients at a time, for the very same reasons - quality and value.
Percentage of web traffic that is encrypted (leaving most security blind) - NSS Labs
Percentage of advanced threats hidden inside SSL traffic - Zscaler
Global IT spending increase over the next 3 years - Gartner
Security through 2020
Percentage of new security technologies delivered as a service - Gartner
Kind words from those who truly know me and what ZecurityAscent can do.
My bi-weekly newsletter features all the top upcoming Atlanta security events.
Get in touch
(your contact information will not be shared or sold)
Our Deep Thoughts
Blog Posts Worth Sharing
One of the more remarkable things that seems to have become trendy is bashing those with infosec certifications. With great regularity, I see Twitter and LinkedIn posts by other infosec professionals, many of whom I follow, actually poking fun at CISSPs and other security credentials. While not entirely new, the increase is most definitely there. And it’s[…]
Ahhh…all those security “partners” and self-professed “trusted advisors” out there. Who are they, really? What are they all about these days? Is price the only thing that matters? If you are like me, you have probably associated these as the Value Added Resellers (VARs) that permeate the market. Why? Well because they told us they were[…]
The legacy information security Value Added Resellers (VARs) are really struggling with showing their true value. And that’s a really good thing. Let’s explore where they are failing…and why. And, of course, why their market correction will ultimately bring about a better information security landscape for everyone. VARs are Pushing Tin The vast majority of[…]
Believe it or not, I have actually seen even large and otherwise sophisticated IT departments fail at moving security to the cloud. At first, it doesn’t even compute. The cloud is supposed to be easier. It’s supposed to be more agile. It’s supposed to be better! And it is…mostly. So why are some failing at[…]
There are two situations that constantly leave me a bit awestruck in the world of information security consulting. And after reading this, especially as a “customer”, I’m betting you will agree. But before I jump right into what those two are, let’s quickly define what a true IT security consultant does. So what does this[…]
When you see these lyrics, what comes to mind? Five hundred twenty-five thousand Six hundred minutes How do you measure – measure a year? Hopefully you recognize it as a truly great Broadway hit musical song (from the play Rent), especially since it has been featured in so many uplifting campaigns. But if I were to[…]
At ZecurityAscent, one of the key metrics we measure with each engagement is how much wealth was created. And by wealth, we mean discretionary free time, from the executives to the individual contributors. And we do this because this metric is what makes achieving and exceeding both personal and professional goals a reality. By leveraging[…]
From the “Top 10 Signs Your Network and Security Design Might Be Far Behind” Series Half pregnant. Half secure. Just about anything that is “half” is probably not a good thing. And that certainly holds true with cloud security. But I get it. Cloud security it far newer to some than others and people generally see[…]
From the “Top 10 Signs Your Network and Security Design Might Be Far Behind” Series It’s time for an insider tip for all those out there who haven’t spent tons of time working sales as a security appliance vendor. When a prospect says to the sales person “We would love to talk, but we just renewed your[…]
From the “Top 10 Signs Your Network and Security Design Might Be Far Behind” Series I believe most out there would consider me to be an expert on remote access. After all, way back in 2003, Nortel, having found a paper I had written that was published by the SANS Institute on the topic of building[…]
From the “Top 10 Signs Your Network and Security Design Might Be Far Behind” Series Setting your CFO (or equivalent for those privately held companies) is perhaps the #1 thing we can do to set everyone up for success. Even if it’s not an absolute #1, few can argue it’s not high enough up on the[…]
From the “Top 10 Signs Your Network and Security Design Might Be Far Behind” Series Completely Satisfied With What I Built (said no engineer ever) Chances are, you didn’t build the network that you oversee now. It was built long ago and attribution as to who was the chief architect and designer is neither possible or[…]
From the “Top 10 Signs Your Network and Security Design Might Be Far Behind” Series Several years ago I had a large security appliance vendor do a big presentation for me and our larger team about their cloud offering. Apparently they were now believers in cloud security and were now hosting their appliances in their data centers.[…]
From the “Top 10 Signs Your Network and Security Design Might Be Far Behind” Series I think we have all been there. We are sitting at our desk trying to get work done and the network just won’t keep up with us. Maybe it’s those recurring training videos that we have to watch or some O365[…]
From the “Top 10 Signs Your Network and Security Design Might Be Far Behind” Series By absolutely all accounts, well over half of all Internet web traffic is encrypted. Zscaler’s research team also recently noted that 54% of threats blocked were hidden inside of SSL. It’s no wonder, then, that so much leaks out of most[…]
From the “Top 10 Signs Your Network and Security Design Might Be Far Behind” Series It’s kind of crazy when you think about it. We have continued to build the old hub-and-spoke networks for decades now. Then we started letting the users work from just about anywhere over a decade ago. And now, in the cloud age,[…]