You will get policy documents and preparation for ISO 27001, SOC 2, PCI, GDPR audits
You will get policy documents and preparation for ISO 27001, SOC 2, PCI, GDPR audits
Project details
End-to-end security policies and preparation for security audits such as ISO 27001, SOC 2, PCI, and GDPR. Delivered by CISOs and CTOs that built teams and departments at large enterprise corporations.
Cybersecurity Expertise
Data Protection, Audit, Risk AssessmentTechnology Type
Computer Network, Data Center, Database, SaaS, Web Application, Email System, Mobile DeviceCybersecurity Regulation
GDPR, ISO, NIST Cybersecurity Framework, PCI DSS, SOC 2Company Size
Small Company Size$1,500
- Delivery Time 14 days
- Security Analysis
6 reviews
(5)
(1)
(0)
(0)
(0)
This project doesn't have any reviews.
EP
Eric P.
Mar 9, 2024
IT Security Policies / SOC2
DN
Duarte N.
Jun 3, 2023
Security analysis of a Windows server
ES
Ezzadin S.
May 7, 2023
Securing API - Best Practice
Shiran knows his stuff. He managed to get the things I needed the next day. I will definitely hire him for my future projects. Thanks Shiran!
AS
Antonio S.
Apr 22, 2023
Active and Passive Vulnerability Scanning Tools
PP
Prajwal P.
Mar 7, 2023
MDR Expert: Fresh Service Setup
Shiran being an expert in the field, provided his guidance to us and helped us with our question and problems.I would highly recommend Shiran for his experience in Cyber Security and his understanding of the Business.
About Shiran
Cybersecurity, Risk Assessment, Audits, Penetration Testing, Training
83%
Job Success
Tel Aviv, Israel - 10:51 am local time
Experience building cybersecurity and cyber intelligence products, services, and departments from end to end - from idea to delivery, operations.
Expertise, Experience, and Services:
-Cybersecurity Posture Enhancement Programs
-Penetration Testing and Risk Assessments
-Regulatory Compliance and Audit Preparation, Including Policy/Procedure Documents
-Virtual CISO Services
-Training and Awareness
-Incident Response
Key Deliverables and Outcomes:
-Secure systems and peace of mind via evidence-based penetration tests and risk assessments
-Compliance with the needed security, financial, legal, health, and regional regulatory requirements
Steps for completing your project
After purchasing the project, send requirements so Shiran can start the project.
Delivery time starts when Shiran receives requirements from you.
Shiran works on your project following the steps below.
Revisions may occur after the delivery date.
Information collection and client interview
Gathering of client requirements for efficient delivery.