Computer security is on everyone's minds these days.  Every day brings another story of another breach.  Often organizations find they need an outside consultant to assist them.  This can include security training, security audits, penetration tests, helping to create security policies, and more.  When you want security consulting you want to make certain you are getting highly qualified, highly experienced people. A brief summary of Mr. Easttom's qualifications are given here:

  • Mr. Easttom has over 25 years in IT

  • He holds over 40 Industry certifications including major security certifications such as CISSP, CEH, CHFI, ISSAP, ECSA, CCFP, CIW Security Analyst, and more.

  • Mr. Easttom is the author of 20 computer science books. Four are computer security books, three are cyber forensics books, and one is a cryptography book.

  • He frequently teaches computer security including cryptography, penetration testing, forensics, and security procedures to various companies, law enforcement agencies, government agencies, and friendly foreign governments.

  • He was part of the original team that created the CompTIA Security+ certification. He also worked on the revising of the Certified Ethical Hacker v8 and is the creator of the Professional Pen Testing certification.

  • Mr. Easttom has many years of practical security experience including audits, penetration tests, and formulating security policies.

  • He is a frequent speaker on computer security topics. He has been a speaker at Secure World Houston, Hacker Halted, Takedowncon, Hakon India, ISC2 Security Congress, Harvard Computer Society, Columbia University ACM Chapter, University of Texas at Dallas ACM Chapter, to name just a few.

Security Consulting

Services Chuck Easttom provides:

Security Audit: A complete audit of your organizations network security including review of policies, disaster recovery plans, security measures, firewalls, logging, anti virus, employee training, and more.  The cost for this is based on the size of the network.

Policy Review: Setting up or revising your incident response policies, disaster recovery policies, forensic policies, or other security related policies.

Penetration Testing:  A penetration test is when a skilled person utilizes hacking techniques to attempt to compromise your security.  If such a test is performed in a thorough, but safe manner, it can reveal security flaws that no security audit would uncover. The time required for a penetration test is based on the specific items tested. 

Forensic Analysis: In addition to many years of teaching forensics, Mr. Easttom provides forensic services. For details see his forensics page.

Security Consulting:
consulting services helping you develop security procedures and policies, understand your risks, plan your defense, and training programs.

If you wish to discuss these services contact Mr. Easttom at chuck@chuckeasttom.com