A FULL-SERVICE INFORMATION SECURITY CONSULTING FIRM

Pozytek is a Polish word which when translated means: utility, useful, a good benefit.  That is who we are to you and your organization.  We work with you to secure your assets, your data, the tools and processes that have made your company successful.  We can help you with assessing your risk, defining your security strategy, developing a secure architecture, implementing solutions and making security operations more efficient.  We are your Information/Cyber Security Partner.  What can we do for you today?

HOW WE OPERATE

We partner with you to decide the best way forward for your organization. We can deploy our resources using one of several different models that will meet your needs. We will work with you to tailor-fit our workforce and to integrate with your workforce in order to efficiently meet your objectives, timelines, and budget. This is necessary because there are no one-size-fits-all solutions.  Even though every company is a business with strategic goals and objectives, each one is unique and no one knows your company or your needs as well as you do.

INFORMATION SECURITY GOVERNANCE AND RISK MANAGEMENT

Is your risk profile at an acceptable level?  Have you set your levels of materiality regarding risk?  Is your current security architecture aligned with your corporate goals and objectives, how about future business expansion?  Is it scalable?  We can help you work through all of those issues and define a truly scalable information security program that will help your company achieve its objectives while maintaining an acceptable level of risk.  Privacy, security, intellectual property and reputation are all at risk.  We can help you stay in control and make informed decisions.

COMPLIANCE AND REGULATORY CONSULTING

Does your company need to be compliant with HIPAA/HITECH, PCI-DSS, SOX, NERC, FERPA, GLBA, state regulations, GDPR or one of the number of lesser known laws or standards?  We can help you with mapping, identifying and testing your controls as well as helping you build a complete compliance program.  We have helped companies get ready for audits as well as to remediate findings.  We can help prepare your company as well.  We use industry standards such as ISO 27001, NIST 800-53, FISMA, COSO, and COBIT to create a custom solution to your compliance and security needs.

CLOUD SECURITY

The most important thing you must remember in approaching the cloud is that there is no such thing as “The Cloud”.  There are only other people’s computers.  That is not to say your company should not use cloud services.  There are many benefits to a cloud deployment or a cloud augmented infrastructure.  It is only to make sure that everyone understands the risk of using those services.  Our professionals can help your organization classify the data, assess the cloud provider and assess the overall risk that a cloud deployment creates.  That risk assessment can be tied directly into the cost-benefit analysis that should accompany any management decision.  Platform as a Service (PaaS), Infrastructure as a Service (IaaS), or Software as a Service (SaaS); our team is ready to help you assess the risk, construct the appropriate solution and deploy that solution so as to minimize risk and maximize the benefit.

VENDOR AND THIRD PARTY RISK ASSESSMENTS

So, you have finally found the perfect solution to fit one of your business needs. The solution meets all of your business requirements and will be implemented and managed by a new vendor. The question that you should now ask yourself is, what additional risk will this vendor add to your overall security posture and how will they fit into your current business continuity and disaster recovery plans? A more basic question may be whether or not you could even trust this vendor with your data.

Pozytek LLC can help you assess your new vendors for their ability to meet your needs by keeping your data secure. In cases where the new vendor falls short, we can even coach them to get up to speed in order to meet your security standards. Whether it’s on premises or a cloud provider we can help you ensure that your new vendor has your best interest in mind when it comes to security.

ACQUISITIONS AND MERGERS DUE DILIGENCE

Your company is about to acquire another company.  Here are some questions that you should be asking yourself.  How mature is that company’s IT infrastructure and processes?  How much IT Security Risk are we buying?  How can we integrate their security with ours?  Pozytek LLC can help you answer those and other questions about the company that is going to be acquired or one that has recently been acquired.

START UP SECURITY

We understand that as a startup, security may not be your top priority. Before you launch, however, there are a few questions you should consider.

  1. Are you entering into a space where compliance with state, federal, or industry security standards will be required?

  2. Is it important to you to protect the intellectual property that you have acquired during the creation, implementation, and launch of your company, product, or service?

  3. Will information security and privacy matters be important to your customers, and could you potentially lose them if their concerns are not addressed up front?

  4. Will your potential investors be concerned over your viability due to potential information security and compliance issues?

Pozytek LLC can help you answer those four questions and put your startup in a better position to succeed. We can even help you to make your security posture into a selling point.

AGILE DEVELOPMENT AND SECURITY

A number of organizations struggle with how to remain agile in their development efforts and still ensure that security is not lost in the mix.  We can help you build security into your agile development and dev ops with minimum overhead, thereby allowing your organization to keep up with customer/business needs and still buy down the security risk of an ever-changing environment.  Let us help you bake security in.

IDENTITY ACCESS MANAGEMENT

Too often, Identity and Access Management is treated as a technology problem with baselines being drawn from analysis of current access logs or ACL (Access Control Lists).  It is not just a technology problem, it is an enterprise problem that is often rooted in the granting of discretionary access by managers for the sake of convenience or lack of understanding as to the impact that their decisions have for the organization at large.  Those mistakes are often baked into new IAM solutions when they are implemented.  We take a different approach.  We work from the top down and follow data and transactions to their source.  We then work with you to ensure that any IAM program that is implemented is focused on function and data and is aligned with HR and Accounting.  Managers will no longer be granting admin roles to their secretary because it is expedient.

PENETRATION TESTING

Whether it is scanning, automated testing, or hands-on penetration testing, we have you covered.  We have resources both U.S. based as well as overseas depending on your needs, requirements, and budget.

BUSINESS CONTINUITY AND DISASTER RECOVERY

We can help you plan to keep things up and running even under the most extreme circumstances.  Our plans are step-by-step guides with overarching objectives clearly articulated in the event that a step cannot be performed.  This is important because the plan is only good until the first shot is fired (old Army saying), then it is up to the people performing the function to adapt to the intent of the plan (Commander’s Intent – again, an Army leadership thing).  After the dust has settled and your business has survived the event by following the plan, we can help put it all back together with a comprehensive Disaster Recovery Plan.

PROJECT MANAGEMENT

Is your company considering implementing a new Security Solution (Antivirus/Endpoint or DLP Implementation for example) or do you have a project where security is of the utmost importance (during or after the implementation)?  The project managers at Pozytek LLC are at your disposal.  We can partner with you to oversee your project to ensure that your objectives are met while remaining secure, on time, and within budget.

SECURITY MEASUREMENT AND PROCESS IMPROVEMENT

How well are the security efforts at your organization being performed?  Are you measuring the right things?  Do you wonder if there are more efficient ways of carrying out things like provisioning and deprovisioning?  We can help you define your Security Score Card or Dashboard.  In addition, our 6σ (Six Sigma) certified professionals can use tools such as Lean Mapping to measure just how efficient your security functions are and make recommendations as to how they can be tuned.

INFORMATION SECURITY STAFFING (GETTING THE RIGHT PEOPLE ON BOARD)

We are not a recruiting or search firm in the traditional sense.  We only deal with information and cyber security personnel.  What we do is use our expertise in the Information Security arena to help you articulate the specific skills you are looking for, find a match for those skills (directly working with your HR department or your external recruiters) and participate in the vetting and interviewing process.  Our goal is to get you the right skill set and fit without the “overreach” and/or “pay mismatch” that sometimes comes with hiring security professionals.

OTHER CYBERSECURITY SOLUTIONS

If you don’t see exactly what you need in regard to security here, we may still be able to help.  The above is not a comprehensive list of all our services and if we can’t fill your needs, we will do our best to get you in touch with the right people who can.

COMMENTS FROM THE PRINCIPAL AND CEO


We started this company six years ago in order to serve the security needs of companies who seemed to be beset by accounting and auditing firms, which were claiming they were experts in information security and technical security firms, who were claiming to know what was best for the business. Often, their advisory services fell far short in meeting the company’s information security needs while also keeping in mind the operational needs of the company.  Pozytek LLC was created to fill that gap. We keep one foot planted firmly in technology and the other planted firmly in the economics and operational aspects of business. We can help you reduce your risk while maintaining a positive ROI (Return on Investment). Furthermore, we can help you stay one step ahead of attackers and your auditors. I hope you will give us the opportunity to serve your company’s needs.

 

Cheers,

Alan Zukowski, MBA, MS CyberSec, CISSP, CISM, CISA, PMP, CSM, CSPO, ITIL

HAVE QUESTIONS?

CONTACT US

Feel free to contact us with any questions you might have. Emails are typically answered within 24 hours. Should you need to speak with someone immediately, please dial us at 727-331-0747.

Although we are based in the Tampa Bay, FL area we travel almost anywhere.

""
1
First Name
Last Nameyour full name
Company Nameyour full name
Phone Numberyour full name
Your Messagemore details
0 /
Previous
Next