Goldman Security Group

Goldman Security GroupGoldman Security GroupGoldman Security Group

Goldman Security Group

Goldman Security GroupGoldman Security GroupGoldman Security Group
More

Cyber security & COmpliance: Expert Analysis Straight Answers

Cyber security & COmpliance: Expert Analysis Straight AnswersCyber security & COmpliance: Expert Analysis Straight AnswersCyber security & COmpliance: Expert Analysis Straight Answers

Browse our wide array of cyber security and compliance consulting services

Cyber security & COmpliance: Expert Analysis Straight Answers

Cyber security & COmpliance: Expert Analysis Straight AnswersCyber security & COmpliance: Expert Analysis Straight AnswersCyber security & COmpliance: Expert Analysis Straight Answers

Browse our wide array of cyber security and compliance consulting services

About Jim Goldman

Technical Experience

Jim Goldman is a seasoned Cyber Security and Risk Management professional with over 30 years of experience in both the private sector and law enforcement.  He has served as CISO/BISO, VP of Security Governance, Risk Management & Compliance (GRC) and as a Task Force Officer with the FBI Cyber Crime Task Force. Certifications: CISSP, ISO Lead Auditor

Services

Compliance Advisory

   

In the cyber security space, Jim has assisted companies in achieving the following certifications: ISO27001:2022,  SOC2, HIPAA, CMMC.  In the privacy space: GDPR, CCPA/CPRA and in the AI Risk Management Space:  ISO 42001:2023 and NIST AI RMF.



Fractional CISO

   

A Fractional CISO can deliver the value of a full-time CISO but without the same level of investment, especially for smaller organizations or for those security organizations in transition. Jim has extensive experience in strategic planning and development of security organizations, performing comprehensive risk assessments and prioritizing programs and investments accordingly. Jim has also been responsible for network engineering, security engineering, security operations, detection and response, end user computing, as well as security governance, risk management, compliance, and privacy 



Risk Assessment & Management

Risk assessment is just the first step to effective risk management. Unfortunately, many companies stop at the risk assessment stage. Jim has extensive experience building comprehensive Cyber and Enterprise risk management systems that actually drive strategic planning and investment while tracking impact on risk reduction and increases in cyber security maturity. 

NIST Cyber Security Framework (CSF) v2.0 and CIS v8.1

One of the challenges in answering questions such as “Are we secure enough?” and “How much more secure do we need to be?” is the need for a standardized scale against which to measure relative security maturity. The NIST Cyber Security Framework is such a scale but there is no program manual to help companies actually implement the NIST CSF in a comprehensive and meaningful way. Jim has implemented the NIST CSF for multi-billion dollar SaaS companies with integration to risk management programs. 


Center for Internet Security (CIS) v8.1 is a comprehensive set of suggested security controls against which Jim has  conducted numerous assessments as a basis for a Baseline Cyber Risk Assessment, Risk Register, and Risk Mitigation Roadmap.

Security Strategy

Why Security Strategy?

Creating and following an effective cyber security strategy is not easy.  Every company and organization is different when it comes to cyber security requirements - One size does not fit all.  With that said, an effective cyber security strategy is crucial in being able to answer the following questions for your C-Suite and Board of Directors:

  1. Is my organization secure?
  2. What (or who) are the greatest threats to our cyber security?
  3. Are we investing the proper amount of money in the proper areas?
  4. Are we getting a reasonable return on investment for our spending on cyber security?
  5. How secure are we currently and is that secure enough?
  6. How secure will we be/do we need to be in one year, two years from now?
  7. What exactly is it that we are protecting?
  8. Which security certifications should we attain?

Learn More

The creation, implementation, and ongoing management of a cyber security strategy program  is one of our key competencies.  Jim Goldman is highly experienced in providing strategic leadership of cyber security programs for companies of various sizes, from start-ups to multi-billion dollar organizations. 

Contact Us

Drop us a line!

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

.

Goldman Security Group

(765) 491-6160

Copyright © 2019 Goldman Security Group - All Rights Reserved.

Powered by GoDaddy Website Builder