.

Testimonials

The pace in a growing publicly traded biotech firm is always fast and the need for alignment to security best practice and HIPAA is just as intense. The CISOSHARE team helped to deploy the initial security program and policies, as well as many significant strategic initiatives that remained in place and appropriate until our future acquisition. 

-Tony Hayden – Former Clarient IT Leader.

Clarient Biotechnology

The business was trying to understand how to implement a unified security program that supported, but did not constrain innovation, a core focus of our technology-centric business. The Coastline (CISOSHARE) team learned the drivers, built rapport with key stakeholders and then designed and presented options for security program development. Working hand in hand with the leadership team the approach was to evaluate each option in the context of the business and aligned with the strategic direction of the company. This approach instilled buy-in and consensus which added momentum when we needed it most.

-Paul Farley, Former Cox Communications Director, Security Architecture, Risk, and Compliance

Testimonial: Cox Communications

The information security demands on a top 5 US healthcare provider are complicated, to say the least. Adam and team helped us to develop and implement a multi-year security program roadmap and accompanying program processes to ensure we are well positioned to take on the complexities of the future.

-Brian Kreitzer, Chief Information Security Offer, UCLA Health

Testimonial: UCLA Health

“Major brands are now enforcing security standards on market research businesses of every size before partnering with them. With the assistance of CISOSHARE, we were able to quickly secure new business and solve a core business problem – proving we were able to secure our clients’ data. Beta Research is now leveraging the security program to help secure new and recurring business. Additionally, they helped us through the remediation tasks of a global client, something we would’ve struggled to complete by ourselves.”

– Amy Gorelkin, Beta Research Corp., Chief Executive Officer

Testimonial: Beta Research Corp

After a company spin-off of 2 multi-billion corporations, CISOSHARE helped me and my team design and build a security program for data center operations for the new entity I was responsible for as VP of Infrastructure/CTO. The work was a large scope that included tactical policy creation with process design as well as security architecture designs. With CISOSHARE we achieve our goal of building a program, aligned operations to the program. We achieved the required certifications as a result of the program.

-Cameron Cosgrove, former First American VP/CTO of Infrastructure

Testimonial: First American

“We were trying to understand the best structure for establishing a security program that supported all the highly differentiated businesses within our corporate family. Their roadmap and accompanying work provided a foundation that helped us set priorities for the program in place today.”
– Jeff Hecht, The Word & Brown Companies, Chief Compliance & Security Officer

Testimonial | By The Word & Brown Companies for Establishing a Security Program

Approach

Every healthy security program has four characteristics that are essential to success and the function of our services:

SETS A BENCHMARK FOR SECURITY

SETS A BENCHMARK FOR SECURITY

Establishes a definition for security in the environment that enables for a point of measurement. In most organizations, this is established for security thru a suite of security policies, standards, as well as, program and process documentation.

ENABLES MANAGEMENT DECISIONS

ENABLES MANAGEMENT DECISIONS

Organize information from regular measurements of the environment against the established benchmark and then present this information to management in a format that enables them to make an inform decision.

ABILITY TO MEASURE AGAINST BENCHMARK

ABILITY TO MEASURE AGAINST BENCHMARK

Implement processes for consistently measuring the environment against the established benchmark. This is generally managed thru the security risk management program for the organization.

SUPPORTS EXECUTION OF DECISIONS

SUPPORTS EXECUTION OF DECISIONS

This is the performance of security specific tasks associated with the security program, as well as supporting the business in the implementation of their security remediation activities as required.

FREE Information Security White Paper

Download Here



Services

PROFESSIONAL SERVICES

PROFESSIONAL SERVICES

Short-term engagements for information security related services; Assessments, Remediation, Security Program Development, Compliance, Business Continuity, etc.

Learn More!

SECURITY PROGRAM AS A SERVICE (SPAAS)

SECURITY PROGRAM AS A SERVICE (SPAAS)

Managed service model focused on the development and implementation of a comprehensive Cyber Security Program. This service allows you to focus more on your core business.

Learn More!

Security Program Progress Guide

Need a Step by Step Guide to a Healthy Security Program? 

Our Security Program Progress Pack is Here to Help Move Your Security Program Forward! 

Get Started Today, It’s Free!

Leadership Team

Mike Gentile

Mike Gentile

“CISOSHARE from the beginning has been an experiment in what it would take to create the most effective team-based business learning and teaching environment possible. The results have created an experience, team and progress that leaves me floored with each and every passing moment.” – Mike Gentile

President and CEO

Mike Gentile has been on the front lines of helping organizations build Information Security Programs for more than 20 years. He has written multiple recognized books on the subject, provided hundreds of presentations, and built many Security Programs in both internal and external consulting roles for organizations ranging from bootstrap start-ups to leading Fortune 500’s. Many of Mike’s publications are used as courseware in advanced education organizations around the world.

Follow Me:

 

Adam Couch

Adam Couch

“Before you are a leader, success is all about growing yourself. When you become a leader, success is all about growing other.” -Jack Welch

Vice President of Professional Services

Adam is a leader in cyber security program development with over 15 years of demonstrating proven results building programs, teams, and managing security incidents.  He has comprehensive knowledge of building risk management, incident management, and training and awareness programs for startups, healthcare, and government clients.

Follow Me:

 

Jason Faulk

Jason Faulk

“Networking is not collecting contacts! Networking is about planting relationships. ” -MiSha.at

Vice President, Client Success, Operations

Jason is an accomplished sales executive with proven ability to drive business growth through sales initiatives that deliver market penetration, revenue growth, and profitability.  He has extensive experience in sales, marketing, and project management as it relates to Cyber Security.

Follow Me:

 

Ryan Vallone

Ryan Vallone

“Innovation distinguishes between a leader and a follower” -Steve Jobs

Vice President of Sales & Marketing

Ryan has been leading sales and marketing efforts in organizations for over 20 years. He continues to find innovate ways to attract, acquire and retain customers. Ryan has worked with companies like Nike, Google, Johnson & Johnson, Justin Vineyards and has a diverse industry background in retail, financial, insurance, manufacturing and technology.

Follow Me:

Tiffany Gentile

Tiffany Gentile

Tiffany L.  Gentile, CPA,  serves as the Controller at CISOSHARE, where she is in charge of all financial systems and programs. An executive level professional with over fifteen years of experience in the accounting industry, she is a Certified Public Accountant and member of the American Institute of Certified Public Accountants. Tiffany specializes in high-growth companies and has experience in many industries including: non-profit organizations, technology, information security, consulting and more.

Prior to CISOSHARE, she served as the Chief Financial Officer (CFO) at Delphiis, a security technology start-up which was acquired by a publicly traded technology company in 2014. While at Delphiis, Tiffany supported all aspects of financial and accounting management at the business, as well as played a key role during its acquisition. Before that, she served as a Senior Accountant with Anthony & Associates in Brea, California.

 

 

Privacy page

@CISOSHARE 2017

ALL RIGHT RESERVED 

PRIVACY POLICY

Map