Dujour Enterprises LLC

Dave Cameron, CISSP

Principal

Dujour Enterprises


Mr. Dave Cameron is the Principal at Dujour Enterprises, a strategic security advisory and consulting firm. He has over 20 years of combined experience in Information Security, Physical Security, Business Continuity Management and Regulatory Affairs. He holds a CISSP certification.


Global, C-Level Data Security & Risk Executive

Drives enterprise profitability … Manages cyber risk … Enables business strategies

Strategic, C-level Data Security and Risk Executive who drives enterprise profitability and protects stakeholders by securing information assets, managing cyber risk, and enabling business strategies. Held top security role for multi-line global Re/Insurance company accountable for driving cultural and organizational change throughout the entity and implementing a sustainable cost effective information security practice.


The virtual Chief Security Officer of today and tomorrow...What I can do for you and your company immediately.


A virtual Chief Security Officer (vCSO) educates and strategizes with executives, security and technology teams to safeguard information and digital assets while supporting business operations with augmented cyber expertise to reduce business risk, signal commitment to data security and enhance the overall security posture of the organization.

Irrespective of regulatory scrutiny in your industry or organization, too much is at stake to not have a vCSO. A security leader has the specialized technical knowledge and corporate governance experience to help build a strong cyber security foundation and the agility to prevent, detect and mitigate evolving threats while enhancing the “security IQ” of your entire organization.

You can rely on a vCSO to have the technical expertise, business acumen and communication skills to make an immediate impact. Working with companies of various sizes the delivery and execution, specifically aligning information security strategies with your company’s unique needs and challenges is paramount.

Services and offerings include:

· Setting or directing privacy and security policies, standards, procedures, and guidelines

· Managing and directing information security, business continuity and physical security teams

· Engaging with executive management

· Running risk assessments on operational security

· Providing threat intelligence and manage enterprise security

· Crisis management

Training and Awareness

Security awareness is an important part of maintaining a robust program. As your vCSO, I can recommend and help implement training on topics for every level of colleague within your organization. This can range from the highly technical (e.g., secure coding practices) to general data handling education to combating business email compromise. I will oversee ongoing and controlled phishing campaigns, to determine security awareness levels among your colleagues while increasing their “Security IQ”.

Security Strategy & Definition

Guiding executives across business function and IT, helps identify business threats, provides a baseline for your current security program, and defines security strategy in line with business objectives and technology strategies. The strategy helps ensure an effective and efficient effort mapping to multiple cyber regulations (e.g. HIPAA, GDPR, FINRA and NYDFS amongst others).

Assessment

Evaluating culture, processes, and technologies from a security governance perspective, will help effectively manage your information security strategy and program. Assessments can include:

  • Interviews with stakeholders across the technical, business, and executive teams as well as gathering documentation

  • Robust reviews of a variety of areas, including information asset management, acceptable use policies, data classification, threat and vulnerability management and third-party management

Oversight

Based on the assessment findings, various types and levels of ongoing support can be implemented, including:

  • Developing policies and procedures to close gaps in documentation

  • Developing a remediation plan with actionable, prioritized recommendations

  • Implementing the remediation plan

  • Providing ongoing strategic guidance that is less intensive, but assists the organization in maintaining long-term goals

Contact Dave Cameron for more information and have your security plan take action.