You will get a fresh Information Security Foundation, Defenses and Best Practices

Scott C.
Scott C.
3.0

Let a pro handle the details

Buy Other Cybersecurity & Data Protection services from Scott, priced and ready to go.

You will get a fresh Information Security Foundation, Defenses and Best Practices

Scott C.
Scott C.
3.0

Select service tier

Assessment and Best Practices

Assessment, Information Security Policy, Best Practices and basic improvements

  • Delivery Time 9 days
    • Small Company Size
    • Medium Company Size
    • Large Company Size
9 days delivery — Oct 23, 2024
Revisions may occur after this date.
Upwork Payment Protection
Fund the project upfront. Scott gets paid once you are satisfied with the work.

Let a pro handle the details

Buy Other Cybersecurity & Data Protection services from Scott, priced and ready to go.

Project details

Yes, it's time for common-sense, cost-effective action. Information security threats are growing.

Insiders agree. Recent informal surveys, working with management at large and small companies, and numerous consulting engagements all point to the same conclusions. Here are three factors that make improving data security challenging and in many ways unsuccessful.

1. Nobody Really Cares. This is a blunt statement but it reflects the low priority that C-level management gives to information security at most companies. Immediately following a data breach, the level of attention and expenditures often increases.

2. Nobody Understands. With few exceptions, staff and management have very little idea what the job of the security team entails. Even the role of the CISO is misunderstood, as most regard data security as strictly an IT responsibility.

3. Fear Drives Cybersecurity. Big money is being spent on high-profile security services, while cost-effective measures are available which won't disrupt your daily operations. Reduce your budget, simplify your data security, and manage everything in one place.

At each level, we provide just the tools and strategies you need.
Cybersecurity Expertise
Data Protection, Risk Assessment, Cybersecurity Awareness
Technology Type
IaaS, Computer Network, Data Center, Database, SaaS, Web Application, PaaS
Cybersecurity Regulation
ISO, NIST Cybersecurity Framework
What's included
Service Tiers Starter
$1,000
Standard
$3,000
Advanced
$9,000
Delivery Time 9 days 23 days 60 days
Small Company Size
Medium Company Size
Large Company Size

Frequently asked questions

3.0
1 review
1% Complete
(0)
1% Complete
(0)
100% Complete
1% Complete
(0)
1% Complete
(0)
Rating breakdown
Availability
3.0
Deadlines
3.0
Skills
3.0
Quality
3.0
Cooperation
3.0
Communication
3.0

NR

Nicole Range R.
3.00
Jul 22, 2020
CompTIA Security+ SY0-601 : SME to write our step by step guides based on the exam objectives. Asked lots of questions and was very enthusiastic.
Scott C.

About Scott

Scott C.
Experienced CyberSecurity Professional, Manager, Trainer
3.0  (1 review)
Tampa, United States - 2:14 am local time
20 years in business as entrepreneur, developer and consultant, but new to Upwork.

Experienced IT professional skilled in cybersecurity, content development and writing, web development, and business management. Computer Science Degree, Masters in Business, Certified Ethical Hacker and Comptia Security+ Certifications. Experience in managing large web content and software development and implementation projects as well as mid-market consulting.

Designed and created the popular FlexTraining learning platform, used by over 3 million learners, and built a company to deliver and support it.

I believe in the importance of data security planning, policy creation, and most importantly, user awareness training. These are the most cost-effective investments in better information security.

Created formal Security Policy documents for the mid-market, including policy objectives, office controls, physical controls, server and network controls, incident reporting, and compliance, using NIST framework as appropriate. Created and currently maintain web site for Cybersecurity practice, to include a simple guide to getting started, services outline, key questions, and promoting user education as a risk-management strategy.

See links at bottom of page at the FlexTraining.com web site to read some of my short LinkedIn articles on various subjects.

Also created the Risk Assistant software application, which is used to identify threats and match them with appropriate cyber defenses. Prototype demo is current online and available.

I also have performed many projects and writing jobs under NDA agreements.

I could possible reduce my rate by 30% or so for an interesting project.

May be available for long-term relationship under the right circumstanced, Happy to jump on a quick Zoom call so we can get to know each other a bit better.

Steps for completing your project

After purchasing the project, send requirements so Scott can start the project.

Delivery time starts when Scott receives requirements from you.

Scott works on your project following the steps below.

Revisions may occur after the delivery date.

A simple assessment

The high-level assessment and a follow-on more-detailed assessment will tell us where we need to focus.

Review of foundation documents - templates provided

We work with you to customize and approve the Information Security Policy Document that everyone will use as a foundation. We review and update the Five Easiest Steps and the 7 Best Practices as well.

Review the work, release payment, and leave feedback to Scott.