SlideShare une entreprise Scribd logo
1  sur  9
1360 Eisenhower Blvd, Suite 204 Johnstown, PA 15904 www.proteus-ocm.net Phone: 814.308-5048 Toll Free: 877.283.1501 Fax: 814.308-5048 Company Profile PROTEUS | OCM
[object Object],[object Object],[object Object],[object Object],Successful experience in all forms of Organizational Compliance Management issues Ability to manage engagements effectively & efficiently Solely dedicated to and 100% focused on information security. Overview – PROTEUS|OCM Benefits
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],PROTEUS|OCM Services
A Team Focused on the Future ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Experience Ownership Innovative Flexibility Teamwork ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Personnel Experience
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Personnel Experience
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Personnel Experience
One of the most important and successful aspects of PROTEUS|OCM is that our consultants strive to maintain industry standard, professional credentials.  This means that not only do our clients receive the best of breed solutions, but we are backed by industry leaders. Qualified Professionals
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Strong Capabilities Summary

Contenu connexe

Tendances

Fraudulent Methods for Attacking Bank Networks and Prevention 2014
Fraudulent Methods for Attacking Bank Networks and Prevention 2014Fraudulent Methods for Attacking Bank Networks and Prevention 2014
Fraudulent Methods for Attacking Bank Networks and Prevention 2014Aladdin Dandis
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringControlCase
 
Raz-Lee Security Corporate Profile
Raz-Lee Security Corporate ProfileRaz-Lee Security Corporate Profile
Raz-Lee Security Corporate ProfileRaz-Lee Security
 
Integrated Compliance – Collect Evidence Once, Certify to Many
Integrated Compliance – Collect Evidence Once, Certify to ManyIntegrated Compliance – Collect Evidence Once, Certify to Many
Integrated Compliance – Collect Evidence Once, Certify to ManyControlCase
 
Achieving Effective IT Security with Continuous ISO 27001 Compliance
Achieving Effective IT Security with Continuous ISO 27001 ComplianceAchieving Effective IT Security with Continuous ISO 27001 Compliance
Achieving Effective IT Security with Continuous ISO 27001 ComplianceTripwire
 
CEO / CXO Architecture - The missing piece in your BI&A architecture
CEO / CXO Architecture - The missing piece in your BI&A architectureCEO / CXO Architecture - The missing piece in your BI&A architecture
CEO / CXO Architecture - The missing piece in your BI&A architectureCorporater
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementPriyanka Aash
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyAegify Inc.
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data SecurityImperva
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) ControlCase
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance MonitoringControlCase
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftAppsian
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROPriyanka Aash
 

Tendances (19)

Fraudulent Methods for Attacking Bank Networks and Prevention 2014
Fraudulent Methods for Attacking Bank Networks and Prevention 2014Fraudulent Methods for Attacking Bank Networks and Prevention 2014
Fraudulent Methods for Attacking Bank Networks and Prevention 2014
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity Monitoring
 
Ch2 cism 2014
Ch2 cism 2014Ch2 cism 2014
Ch2 cism 2014
 
Raz-Lee Security Corporate Profile
Raz-Lee Security Corporate ProfileRaz-Lee Security Corporate Profile
Raz-Lee Security Corporate Profile
 
Integrated Compliance – Collect Evidence Once, Certify to Many
Integrated Compliance – Collect Evidence Once, Certify to ManyIntegrated Compliance – Collect Evidence Once, Certify to Many
Integrated Compliance – Collect Evidence Once, Certify to Many
 
Achieving Effective IT Security with Continuous ISO 27001 Compliance
Achieving Effective IT Security with Continuous ISO 27001 ComplianceAchieving Effective IT Security with Continuous ISO 27001 Compliance
Achieving Effective IT Security with Continuous ISO 27001 Compliance
 
Ch4 cism 2014
Ch4 cism 2014Ch4 cism 2014
Ch4 cism 2014
 
CEO / CXO Architecture - The missing piece in your BI&A architecture
CEO / CXO Architecture - The missing piece in your BI&A architectureCEO / CXO Architecture - The missing piece in your BI&A architecture
CEO / CXO Architecture - The missing piece in your BI&A architecture
 
Ch3 cism 2014
Ch3 cism 2014Ch3 cism 2014
Ch3 cism 2014
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
S Rod Simpson Resume
S Rod Simpson ResumeS Rod Simpson Resume
S Rod Simpson Resume
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk Management
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with Aegify
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data Security
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoft
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIRO
 
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
Kerangka untuk RPM Information Security Governance: COBIT 5 for Information S...
 

En vedette

Using LinkedIn For Business
Using LinkedIn For BusinessUsing LinkedIn For Business
Using LinkedIn For Businessashishkulkarni
 
C. Porchietto Giornale Piemonte 27.05.09
C. Porchietto Giornale Piemonte 27.05.09C. Porchietto Giornale Piemonte 27.05.09
C. Porchietto Giornale Piemonte 27.05.09Claudia Porchietto
 
C. Porchietto La Stampa 10.05.09
C. Porchietto La Stampa 10.05.09C. Porchietto La Stampa 10.05.09
C. Porchietto La Stampa 10.05.09Claudia Porchietto
 
C. Porchietto La Stampa Torin 06.06.09
C. Porchietto La Stampa Torin 06.06.09C. Porchietto La Stampa Torin 06.06.09
C. Porchietto La Stampa Torin 06.06.09Claudia Porchietto
 
C. Porchietto Cronaca Qui.It 10.06.09
C. Porchietto Cronaca Qui.It 10.06.09C. Porchietto Cronaca Qui.It 10.06.09
C. Porchietto Cronaca Qui.It 10.06.09Claudia Porchietto
 

En vedette (6)

Using LinkedIn For Business
Using LinkedIn For BusinessUsing LinkedIn For Business
Using LinkedIn For Business
 
C. Porchietto Giornale Piemonte 27.05.09
C. Porchietto Giornale Piemonte 27.05.09C. Porchietto Giornale Piemonte 27.05.09
C. Porchietto Giornale Piemonte 27.05.09
 
C. Porchietto La Stampa 10.05.09
C. Porchietto La Stampa 10.05.09C. Porchietto La Stampa 10.05.09
C. Porchietto La Stampa 10.05.09
 
C. Porchietto La Stampa Torin 06.06.09
C. Porchietto La Stampa Torin 06.06.09C. Porchietto La Stampa Torin 06.06.09
C. Porchietto La Stampa Torin 06.06.09
 
C. Porchietto Cronaca Qui.It 10.06.09
C. Porchietto Cronaca Qui.It 10.06.09C. Porchietto Cronaca Qui.It 10.06.09
C. Porchietto Cronaca Qui.It 10.06.09
 
Using LinkedIn
Using LinkedInUsing LinkedIn
Using LinkedIn
 

Similaire à Proteus OCM Company Profile

Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
Security_360_Marketing_Package
Security_360_Marketing_PackageSecurity_360_Marketing_Package
Security_360_Marketing_PackageRandy B.
 
VetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team CapabilitiesVetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team CapabilitiesVetsAmerica
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh ShanmughanathanSharath Kumar
 
Technisource Overview
Technisource  OverviewTechnisource  Overview
Technisource OverviewJav360
 
Technisource Overview
Technisource OverviewTechnisource Overview
Technisource Overviewguestaa29dc
 
PCSG Corporate Overview
PCSG Corporate OverviewPCSG Corporate Overview
PCSG Corporate Overviewjayallen77
 
Prithvi Corporate Presentation
Prithvi Corporate PresentationPrithvi Corporate Presentation
Prithvi Corporate Presentationguest92fc7f
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
All Covered Finance_Brochure
All Covered Finance_BrochureAll Covered Finance_Brochure
All Covered Finance_BrochureCarolyn Tarrant
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016SteveAtHPE
 
Segue Capabilities Basic Overview Sep 2011
Segue Capabilities   Basic Overview Sep 2011Segue Capabilities   Basic Overview Sep 2011
Segue Capabilities Basic Overview Sep 2011DavidHart
 
Capabilities Overview 20100414 V1
Capabilities Overview 20100414 V1Capabilities Overview 20100414 V1
Capabilities Overview 20100414 V1nbcoenen
 
Omnitech Corporate Presentation
Omnitech Corporate PresentationOmnitech Corporate Presentation
Omnitech Corporate Presentationprashantjky
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessLaura Perry
 
BV Company Overview Web
BV Company Overview WebBV Company Overview Web
BV Company Overview Webjlbrewer
 

Similaire à Proteus OCM Company Profile (20)

Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
Ace pitch deck
Ace pitch deckAce pitch deck
Ace pitch deck
 
Security_360_Marketing_Package
Security_360_Marketing_PackageSecurity_360_Marketing_Package
Security_360_Marketing_Package
 
VetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team CapabilitiesVetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team Capabilities
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
 
Technisource Overview
Technisource  OverviewTechnisource  Overview
Technisource Overview
 
Technisource Overview
Technisource OverviewTechnisource Overview
Technisource Overview
 
PCSG Corporate Overview
PCSG Corporate OverviewPCSG Corporate Overview
PCSG Corporate Overview
 
Prithvi Corporate Presentation
Prithvi Corporate PresentationPrithvi Corporate Presentation
Prithvi Corporate Presentation
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
All Covered Finance_Brochure
All Covered Finance_BrochureAll Covered Finance_Brochure
All Covered Finance_Brochure
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 
Eng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-LatestEng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-Latest
 
PCMJcapstone
PCMJcapstonePCMJcapstone
PCMJcapstone
 
Segue Capabilities Basic Overview Sep 2011
Segue Capabilities   Basic Overview Sep 2011Segue Capabilities   Basic Overview Sep 2011
Segue Capabilities Basic Overview Sep 2011
 
Capabilities Overview 20100414 V1
Capabilities Overview 20100414 V1Capabilities Overview 20100414 V1
Capabilities Overview 20100414 V1
 
Omnitech Corporate Presentation
Omnitech Corporate PresentationOmnitech Corporate Presentation
Omnitech Corporate Presentation
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
BV Company Overview Web
BV Company Overview WebBV Company Overview Web
BV Company Overview Web
 

Proteus OCM Company Profile

  • 1. 1360 Eisenhower Blvd, Suite 204 Johnstown, PA 15904 www.proteus-ocm.net Phone: 814.308-5048 Toll Free: 877.283.1501 Fax: 814.308-5048 Company Profile PROTEUS | OCM
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. One of the most important and successful aspects of PROTEUS|OCM is that our consultants strive to maintain industry standard, professional credentials. This means that not only do our clients receive the best of breed solutions, but we are backed by industry leaders. Qualified Professionals
  • 9.