Select Page

Content

Cyber Security

News

Keep Yourself Protected

Published Books

See for yourself how experienced we are in the world of cyber security.

Biometric Technology

Biometric Technology

Adopting Biometric Technology

Adopting Biometric Technology

The Science of Biometrics: Security Technology for Identity Verification

The Science of Biometrics: Security Technology for Identity Verification

Protecting Information Assets and IT Infrastructure in the Cloud

Protecting Information Assets and IT Infrastructure in the Cloud

Testing and Securing Web Applications

Testing and Securing Web Applications

Practical AI for Cybersecurity

Practical AI for Cybersecurity

The Internet of Things: Its Past, Present, & Future

The Internet of Things: Its Past, Present, & Future

Supplementary Training Material For The CySA+ Exam Certification

Supplementary Training Material For The CySA+ Exam Certification

How Do I Get A CMMC Certification?

How Do I Get A CMMC Certification?

The Impacts of COVID-19 on API Security & Web Applications Development

The Impacts of COVID-19 on API Security & Web Applications Development

Zero Trust Architecture

Zero Trust Architecture

The Impacts of the IoT on the Remote Workforce

The Impacts of the IoT on the Remote Workforce

Assessing and Insuring Cybersecurity Risk

Assessing and Insuring Cybersecurity Risk

How To Migrate Your Brick & Mortar Business Into A Virtual One Using Microsoft Azure

How To Migrate Your Brick & Mortar Business Into A Virtual One Using Microsoft Azure

Our 2021 Mid Year Cyber Report: Ransomware

Our 2021 Mid Year Cyber Report: Ransomware

Business Recovery and Continuity in a Mega Disaster: Cybersecurity Lessons Learned from the COVID-19 Pandemic

In February 2020, the United States came to grips of the reality that it was not alone when it came to dealing with the COVID19 Pandemic.  We have impacted in many ways, both from our very existence, to our employment, and even to the financial markets.  Not to mention, even the Cybersecurity Threat Landscape has changed greatly as well.  We have seen new threat variants come out, ranging from Zoombombing to Domain Name Heisting to Virtual Private Networks (VPNs) that are being stretched to well beyond their breaking points.

But despite all of this, there has been a silver lining to all of this, in that the CIOs and CISOs all across Corporate America are now starting to full realize the importance of Incident Response Planning, Disaster Recovery Planning, and Business Continuity Planning.  Also, the concept of the Remote Workforce which everybody thought that wouldn’t take place until at least 2023 has now been fully realized.  The primary goal of this book is to become a How To Guide for the CIO and the CISO in order to prepare for the next disaster, whether it is a large scale Cyberattack, another outbreak of COVID19, or even a horrible weather or natural disaster event.  It will cover the following topics:

  • Chapter 1:  The COVID19 Virus
  • Chapter 2:  The Cyberattacks That Stemmed From COVID19
  • Chapter 3:  The Cybersecurity Lessons That Have Been Learned From COVID19
  • Chapter 4:  How to Prepare For The Next Breed Of COVD19
  • Chapter 5: The Overall Planning Guide

This book is deemed to be the first of its kind.  It is co-authored by Ravi Das, a Business Development Specialist for The AST Cybersecurity Group, Inc. a leading security content firm based in the Greater Chicago, and Greg Johnson, Owner and CEO of Webcheck Security, a top Penetration Testing firm located in Utah.

How to Start Your Own CyberSecurity Consulting Business: First-Hand Lessons From A Burned-Out ExCISO

Probably the team member that has been most wrought with the burnout factor is the Chief Information Security Officer, or aka the “CISO”. 

Because of this, the burnout rate of the CISO is pegged at about 16 months.  In other words, that is what the average tenure of a CISO is at a business.  At the end of their stay, many CISOs look for totally different avenues of work, or, they try something else – namely starting their own Cyber consulting business. 

Although the CISO might have the skill and knowledge set to go about their own, it takes careful planning in order to launch a successful Cyber consulting business.  For instance, this ranges all the way from choosing the right kind of legal formation all the way to the specific area Cybersecurity that they want to serve.

This book will cover the following topics:

Chapter 1: An overview into the CISO demands of the Cybersecurity, and a detailed over as to the burn out factor.

Chapter 2:  It will lay down the concepts of what the ex CISO needs to do in order to get their consulting business up and running.  For example, this will include business plan creation, choice of entity formation, and all of the other necessary protocols to be officially running.

Chapter 3:  This chapter will focus on the different areas that the ex CISO can offer their areas of expertise on.  This will range from the technical (from Pen Testing to advising on AI/ML Tools) to the regulatory (focusing on the compliance side of Cyber) to the human side (Security Awareness Training, Social Engineering, etc).  A big trend here is that of vCISO services, and this will also be explored in greater detail.

Chapter 4: This chapter will focus on the various marketing strategies that the ex CISO can take   in order to get their clientele built up.  Also, the second half of this chapter will be devoted as to how they can potentially can money from the different kinds of investors (Angel Funding, VC Funding, etc.).

Chapter 5:  This chapter will offer tips and advice from the author himself as to how the ex CISO can stay competitive, and how to get through the rough times.

This book is also deemed to be the first of its kind.  It is authored by Ravi Das, a Business Development Specialist for The AST Cybersecurity Group, Inc. a leading security content firm based in the Greater Chicago, and Technosoft Cyber, LLC.

Contact Us

CHICAGO OFFICES

20 Danada Square West, Suite 245
Wheaton, IL 60189

100 Illinois Street, Suite 200
St. Charles, Illinois 60174

AUSTIN OFFICE

7600 Chevy Chase Drive, Suite 300
Austin, TX  78752

CONTACT INFO

Ravi Das, Business Development Specialist
Office: 630-318-4857
Mobile: 630-802-8605
Efax: 888-356-8305
ravi.das@astcybersecurity.com