Secure State Cyber Inc
Secure State Cyber Inc
SECURE STATE CYBER
ABOUT THE COMPANY
We at Secure State Cyber have been specializing in information and cyber security since 2005. In early 2018 we opened our first Canadian office in Halifax with the mission to create security for everyone within the digital society. Through our expertise, we develop information security for companies, authorities and organizations, to ensure a safer digital community for all to participate. We provide comprehensive solutions for information and cyber security as well as individual services. We also have training, ready-made or tailored, digital or on-site, where we deliver the latest knowledge based of our experience in the field. Our customers and partners currently consist of major international companies in the private sector, as well as authorities, county councils, municipalities and defence agencies.
OUR EXPERIENCE AND COMPENTENCE
Our consultants are specialists in information security and come from a diverse range of academic backgrounds, consisting of higher educations in civil engineering, computer systems, law with specialty integrity protection, cognitive scientist, civil economist and computer networking. We are true believers that one should never stop learning and as such, we strive to up skill our consultants at every opportunity. Many of our consultants have personal certifications such as CISSP, CISA, CISM, CRISC and more.In addition to education, many of our consultants have experience in executive roles in large organizations in both the private and public sectors, such as defense, banking and finance, as well as in municipalities and county councils. The titles our consultants have previous held are information security manager, CIO, IT manager and the like. Our unique skills and experience are our valuable tools that we use to help our customers secure their businesses.
Audits are for those organizations that need an impartial review of their current information security. The threat landscape is constantly changing, and the challenge is to ensure that both you and your subcontractors are on top of your cybersecurity.
Types of audits that we perform includes:
IDENTIFY & IMPLEMENT
Identify & implement is the most comprehensive field of information security and is designed for organizations that currently lack comprehensive security. Our range of services helps you identify what security measures your organization needs and helps implement those measures in an effective and cost efficient fashion.
Our identifying and implementing services include:
“We built the company to help organizations manage information security from a holistic perspective. We noticed companies struggling with this approach and focusing solely on technology. We want to change that!”
“We wanted to create a consultant firm that we are proud to work for. A company founded on good values where consultants are committed and caring about both the customer and their colleagues.
Justin has experience in several roles in information technology and cyber security throughout his career. All of which has lead him to being the first employee in Secure State Cyber’s Halifax office. A natural ice breaker with a strong personality, he finds it easy to make friends and influence people.
His main focuses are threat risk assessments, technical audits, penetration testing, user awareness training and managing SOC development projects. He believes that the customer’s success in protecting what is most valuable to them is the key metric for success. He is capable and competent in leveraging the US NIST Cyber Security & Risk management frameworks, ISO 27001, and CIS top 20 to secure the objectives of the customers in his care. He is mission oriented and hasn’t learned how to back down from a challenge yet.
Jan is both a certified IT accountant and risk manager and has worked in information security for more than 15 years in public administration and large organizations. Much of the experience revolves around security audits of Both IT and OT systems with high security requirements and development of structured work with cybersecurity and risks from the ISO 27000 series.
Jan is described by others as a team player with diplomatic streaks that are showcased best in the complex interconnections between people, processes and technology. He is perceived as happy, positive and professional with strong customer focus and ability to find ways forward in information security work based on his extensive experience.
“For several years, we have worked to create a stable foundation and structure in the company, resulting in a certified business management system. Now we are ready to expand and take a market leading position in the information and cyber security industry. By 2019, we will double our staff and develop our product and service offerings to meet our international customers’ needs. We have an exciting and important journey ahead of us! “