What information security solutions do you supply?
We provide market-leading solutions from vendors such as Trend Micro, Tenable Network Security, Juniper, McAfee, Check Point, Blue Coat, Websence, Imperva, Mobile Iron, Content Keeper, Vasco, Axway, IBM/TEM, InfoExpress, Sophos and IronKey.
What are your infosec credentials?
Our consultants’ qualifications include Masters of Science in information security and IT; Certified Information Security Auditor; Certified Information Systems Security Professionals certification; Payment Card Industry Qualified Security Assessor; and ISO 27001 Lead Auditor certification; and a wide range of vendor-specific qualifications.
When did your company first get involved in security?
Content Security was formed in 2000. Myself and co-founder Phil Wurth's vision was to specialise in IT security from day one. Our mission has always been to protect our customers against cyber threats.
What's an infosec trend you've been hearing about?
The latest buzz we’ve seen pop up in the information security world is responding to the Cyber Kill Chain (‘Kill Chain’ was originally a military term). A Cyber Kill Chain is made up of the phases of a targeted attack and how they can be used for protection of an organisation's network.
Can you tell us about a recent project?
A large insurance brokerage firm leveraged our services to extend their entire information security capability. We provide a managed service that includes strategy design, project implementation advice, engineering services to deploy those projects, as well as penetration testing services to constantly test their infrastructure for exploits.
What is driving customers towards security projects?
Not only can a cyber attack cause irreparable damage to an organisation's image, but it can cause entire management teams to be fired. Take the recent Target breach, and how it caused its CIO and CEO to step down. Personal information is the new currency of cyber thieves and cyber attacks have become sophisticated.
Information security is…?
Information security is the future. In a world where more and more services rely on people’s personal information, the standard for information security needs to keep getting better.