ERE Information Security Auditors
Home | Site Map | Contact Us |  Resource Center
list of IT security and compliance audit steps
ERE Differentiators from other vendors
ERE 7x24 monitoring and real time audit service
ERE 7x24 monitoring and real time audit service
 
   
RSS Feed - How to Subscribe  
   
Subscribe RSS Feeds

Ron Lepofsky - LinkedIn

 
   
   
   
Top
ERE Assistance :  
 
 

Ask a question to a security expert

 

Request A Demo

 

Questions or comments

  Request a price quote
 

How to Impartially Select an Auditor

  Request information
  Schedule a demo of 7x24 monitoring service
  Schedule a meeting or telephone call
  Free Needs Analysis
  Budgetary quote to fit budgets both large and small
  Suggest a white paper subject of interest to you
 

Free Cost Justification Case

 
Top
   
Product Literature :  
   

Executive One Page Description of ERE
ERE Differentiators

Sample Sanitized Statement of Work
Sample Sanitized Audit Report

One Page Description of 7x24 Monitoring and Real Time Audit Service
Sentry™ ROI Calculator   
Executive 4 slide PowerPoint
Extensive 28 slide PowerPoint

 
Top
   

IT Security Whitepapers and Published Articles

 
   

Risk Analysis

Chasing the elusive approval for an IT-security budget
Significant references to article by Ron Lepofsky Quantifying Risk and Cost of IT Security Compliance and interview with Ron Lepofsky
Techrepublic
March 05, 2012
By Michael Kassner

Quantifying Risk and Cost of IT Security Compliance
January 28, 2010
By Ron Lepofsky
Download: [ PDF] [ HTML]

Risk Analysis: Do It Right and Save Money
IT Security
September 13, 2007
By John Moore
Download: [ PDF]

IT Security Costs: Outsource vs. Self Deploy
Second of 2 articles to be published in Electricity Today
July 01, 2006
By Ron Lepofsky
Download: [ PDF]

Calculating IT Security Risk
February 01, 2006
By Ron Lepofsky
Download: [ PDF] [ HTML]

Leverage Risk / Reward with Outsourced IT Security
Published by Electricity Today
July 05, 2005
By Ron Lepofsky
Download: [ PDF]

Creating an ROI to Justify Information Security Budgets
Published in the ISSA Journal
March 01, 2005
By Ron Lepofsky
Download: [ PDF]

Top

Vendor Evaluation and Selection

How to Impartially Choose an IT Security Auditor
January 01, 2009
By Ron Lepofsky
Download: [ PDF]

How to Engage a Security Services Firm
Baseline Magazine
March 01, 2007
By John Moore
Download: [ PDF]

Top

NERC CIP

Making SCADA Important to Executive Management
Published by Electricity Today
January 05, 2011
By Ron Lepofsky
Download: [ PDF]

Electricity Utilities Welcome to Information Security Compliance
Published in the ISSA Journal
July 01, 2006
By Ron Lepofsky
Download: [ PDF] [ HTML]

NERC 1300 Made Easier
Published by Electricity Today
April 01, 2005
By Ron Lepofsky
Download: [ PDF]

Top

Threats and Risks

Part 1 Web Application Vulnerabilities - How to Find, Fix and Prevent Them
September 22, 2013
By Ron Lepofsky, CISSP, CISM
Download: [ PDF]

Part 2 Web Application Vulnerabilities - How to Find, Fix and Prevent Them
September 22, 2013
By Ron Lepofsky, CISSP, CISM
Download: [ PDF]

Part 3 Web Application Vulnerabilities - How to Find, Fix and Prevent Them
September 22, 2013
By Ron Lepofsky, CISSP, CISM
Download: [ PDF]

Part 4 Web Application Vulnerabilities - How to Find, Fix and Prevent Them
September 22, 2013
By Ron Lepofsky, CISSP, CISM
Download: [ PDF]

Cyber Extortion by Denial of Service (Dos) Attack
Published in Risk Magazine
May 01, 2006
By Ron Lepofsky
Download: [ PDF] [ HTML]

Preventing Identity Theft
Published in Risk Management Magazine
October 01, 2004
By Ron Lepofsky
Download: [ PDF]

Legal Counsel Can Reduce Fraud Risk
Published in The Bottom Line
March 01, 2004
By Ron Lepofsky
Download: [ PDF]

Top

SOX and Bill 198 CSOX

Bill 198 change may mean less cost but more rigorous internal audits
Published in The Lawyers Weekly
April 12, 2006
By Ron Lepofsky
Download: [ PDF]

Bill 198 places a higher onus for disclosure of information on issuers
Published in The Lawyers Weekly
October 07, 2005
By Ron Lepofsky
Download: [ PDF]

Serious, Common Gap in IT Controls Compliance for Sarbanes-Oxley
Published in The Lawyers Weekly - USA
January 01, 2005
By Ron Lepofsky
Download: [ PDF]

CFO responsibility to fund log analysis for Sarbanes-Oxley Compliance
Published as SC Magazine ".feature" on web site
October 15, 2004
By Ron Lepofsky
Download: [ PDF]

Top

Privacy

Your clients need to understand how privacy regulation applies to them
Published in The Lawyers Weekly - Canada
January 31, 2004
By Ron Lepofsky
Download: [ PDF]

Top

Policy

IT Security Micro Governance
January 12, 2010
By Ron Lepofsky
Download: [ PDF] [ HTML]

Security service - level agreements protect your clients
Published in The Lawyers Weekly - Canada
October 31, 2003
By Ron Lepofsky
Download: [ PDF]

Top
 

ERE Live Presentations

 

Risk Analysis

Linux World Presentation, Security ROI
April 25, 2005
Presenter Ron Lepofsky
[ Click here to watch ]

Electricity Distribution Information Systems and Technology (EDIST) Conference, Cyber Risk LDC Downtime & the ROI Security Budget.
January 26, 2005
Presenter Ron Lepofsky
[ Click here to watch ]

TLOMA, ROI Cost Justification of Information Security
September 26, 2002
Presenter Ron Lepofsky
[ Click here to watch ]

Top

Risks and Threats

CP24, Identity Thefts affect on corporations
May 11, 2004
Presenter Ron Lepofsky
[ Click here to watch ]

Electrical Distributors Association, Annual Conference
May 08, 2004
Presenter Ron Lepofsky
[ Click here to watch ]

Federated Press, Legal Strategies for Outsourcing
March 30, 2004
Presenter Ron Lepofsky
[ Click here to watch ]

Toronto Talks, Identity Theft and Social Engineering
September 23, 2003
Presenter Ron Lepofsky
[ Click here to watch ]

LawNet, Risks and Risk Management for Secure Information
February 06, 2003
Presenter Ron Lepofsky
[ Click here to watch ]

Compaq Canada Presentation.
November 19, 2002
Presenter Ron Lepofsky
[ Click here to watch ]

Tandem Security SIG, Top Security Risks to your Electronic Information Presentation Audio not available
November 19, 2002
Presenter Ron Lepofsky
[ Click here to watch ]

SIP Conference
May 03, 2002
Presenter Ron Lepofsky
[ Click here to watch ]

Seminar Canadian Telecommunications Consultants Association, CTCA
March 23, 2002
Presenter Ron Lepofsky
[ Click here to watch ]

Seminar Society of Internet Professionals Consultants Role within the Information Security Auditing Process SIP
Seminar Society of Internet Professionals Consultants Role within the Information Security Auditing Process SIP
January 03, 2002
Presenter Ron Lepofsky
[ Click here to watch ]

CSIS Presentation
October 24, 2001
Presenter Ron Lepofsky
[ Click here to watch ]

CP24 Interview, How companies are protecting themselves from Cyber Terror.
September 28, 2001
Presenter Ron Lepofsky
[ Click here to watch ]

CP24 Interview, Third party security companies staying ahead of the latest security risks
May 20, 2001
Presenter Ron Lepofsky
[ Click here to watch ]

Top

Policy

CP24 Interview, CEOs role in information security.
August 03, 2001
Presenter Ron Lepofsky
[ Click here to watch ]

Top
ERE IT Security Quiz :
 

executive summary of ERE security monitoring service
This survey was provided by CIO magazine for visitors to the ERE web site.

 

IT Security Research Library of URLs:

 
 

Contact Us

905 764 3246

 
 
  Budgetary Price Quote
  10 minute scope definition call
  ROI Calculation for your next Audit 
  Sanitized Statement of Work
  Sanitized Audit Report
  Product Literature  
  White Papers and Published Articles
   
  Please see Ron Lepofsky’s book,
The Manager’s Guide to Web Application Security,
published by Apress Media

https://www.apress.com/9781484201497

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively.

 
ERE managed intrusion detection service
Home | Technology Audits | Compliance Audits | Process Audits | Doc Audit/Authorship| | 7x24 Monitoring | Knowledge Transfer
ERE Differentiators | About Us | Site map | Contact Us | |   | Resource Center
Copyrights © 2007-2008. All rights reserved.  

   AddThis Social Bookmark Button