SlideShare a Scribd company logo
Company Overview:

 •   Organizational History
 •   What We Do
 •   How We Do It
 •   Assessment Services
 •   Consulting Services
 •   Compliance Services
                                    Your Security. Our Passion.
 •   Description of Professionals
 •   Client Profiles


www.FRSecure.com | 952-442-1709
Organizational History
 FRSecure is a full-service information security consulting company.

 The company was established in the spring of 2008 by a group of
 seasoned information security professionals who sought to provide
 the type of consultant “we wished we had when we were building
 and managing our own information security programs”.




www.FRSecure.com | 952-442-1709
What We Do

 As an information security consulting company, we help businesses
 find and fix vulnerabilities.

 "Information Security“ Defined:

     •   Information - your intangible assets. People usually assume this means data, which it does,
         but it also includes hard copy information and the stuff in your head. Basically, think about
         any information that if you lost it your business would suffer. That's what we protect.

     •   Security - keeping that information confidential, accurate, and available.




www.FRSecure.com | 952-442-1709
How We Do It
 We focus on security in 5 major areas:
                                                                    Policy and
                                                                    Procedures

 • Administrative Security
      •   Policy & procedure
                                                                                           External
      •   Sometimes called General Controls   Physical
                                                                                              IT
                                              Security
 •   Physical Security                                              Core                   Security


 •   External IT Security
 •   Internal IT Security
                                                                    Data
 •   Application Security
                                                         Software                Internal IT
                                                         Security                 Security




www.FRSecure.com | 952-442-1709
How We Do It

 We perform assessments of your security in those five areas. If we
 find problems, we report them to you along with our
 recommendations on how they can be resolved.

 Should you need or want help resolving those issues, we do that
 through our consulting services.




www.FRSecure.com | 952-442-1709
Assessment Services
 We perform the following types of assessments:

     •   Information Security
     •   Compliance
     •   Administrative (General) Controls
     •   Physical Security
     •   Internal Network Security
     •   External Network Security
     •   Application Security
     •   Small Business Security



www.FRSecure.com | 952-442-1709
Consulting Services
 FRSecure offers security consulting services such as:

     •   Security Health Checkup
     •   Outsourced Security Program Design and Development
     •   Vendor Risk Management
     •   Penetration Testing
     •   Policy Creation
     •   SAS70/SSAE16 Readiness
     •   BC/DR Planning and Testing
     •   Incident Response
     •   And much more…


www.FRSecure.com | 952-442-1709
Compliance Services
 FRSecure offers the following compliance solutions:

     •   Financial Services Compliance Solutions (GLBA/FFIEC and FinCEN)
     •   Healthcare Compliance Solutions (HIPAA)
     •   Utilities Compliance Solutions (NERC CIP)
     •   Education Compliance Solutions (FERPA)
     •   Government Compliance Solutions (FISMA, NIST, and FIPS)
     •   Payment Card Industry Compliance Solutions (PCI)
     •   ISO/IEC 27001 Compliance
     •   ISO/IEC 27036 Compliance
     •   Customer Compliance


www.FRSecure.com | 952-442-1709
Description of Professionals
 All information security professionals working for FRSecure have, at a minimum:
     •   A valid, and active Certified Information Security Systems Professional (“CISSP”)
         certification,
     •   Real-world information security experience; building, managing, and improving information
         security programs for which they have been directly responsible for,
     •   An average more than 10 years of information security practitioner experience, and;
     •   A passion for helping clients solve information security challenges.


 Additionally, FRSecure’s professionals have real-world experience working in and
 for a wide range of organizations; from the Fortune 500 to the small community
 bank, and everything in between.




www.FRSecure.com | 952-442-1709
Client Profiles
 FRSecure has worked with hundreds of organizations ranging in size from 5 to
 more than 250,000 employees; both publicly and privately-owned. Some of the
 more notable organizations include Wells Fargo, U.S. Bank, UnitedHealth Group,
 ADP, ADC, First Data, and Eisai.

 Although FRSecure has extensive experience working with organizations of all
 sizes, we specialize in working with organizations that fit the following profile:
     •   Organizations with less than 10,000 employees
     •   Organizations with compliance, intellectual property protection, and/or customer-specific
         security needs
     •   Organizations with a need to compliment in-house information security expertise
     •   Organizations with information security budget constraints
     •   Organizations that require or prefer an independent opinion or review



www.FRSecure.com | 952-442-1709

More Related Content

PPT
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
PPTX
Information security: importance of having defined policy & process
PPT
Information Security Lesson 1 - Eric Vanderburg
DOCX
The Role of Information Security Policy
DOCX
Classifying Data to Help Secure Business Information - Template fromMicrosoft
PPTX
Sensitive data
PPTX
Information Systems Policy
PPT
Information Security Management.Introduction
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information security: importance of having defined policy & process
Information Security Lesson 1 - Eric Vanderburg
The Role of Information Security Policy
Classifying Data to Help Secure Business Information - Template fromMicrosoft
Sensitive data
Information Systems Policy
Information Security Management.Introduction

What's hot (18)

PPTX
Importance Of A Security Policy
PPT
Chapter 3: Information Security Framework
PPTX
Become CISSP Certified
PDF
2015 09-22 Is it time for a Security and Compliance Assessment?
PDF
Fadi Mutlak - Information security governance
PPT
[null] Iso 27001 a business view by Sripathi
PPTX
ISO 27001 - information security user awareness training presentation - Part 1
PDF
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
PPTX
Information security group presentation ppt
PDF
Information Security Fundamentals
PDF
Drivelock modern approach of it security & amp; encryption solution -whitep...
PPTX
A guide to Sustainable Cyber Security
PPTX
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
PPTX
IT compliance
PPT
Implementing an Information Security Program
PDF
Classification-HowToBoostInformationProtection
DOCX
ISO 27001 Training | ISMS Awareness Training
Importance Of A Security Policy
Chapter 3: Information Security Framework
Become CISSP Certified
2015 09-22 Is it time for a Security and Compliance Assessment?
Fadi Mutlak - Information security governance
[null] Iso 27001 a business view by Sripathi
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
Information security group presentation ppt
Information Security Fundamentals
Drivelock modern approach of it security & amp; encryption solution -whitep...
A guide to Sustainable Cyber Security
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
IT compliance
Implementing an Information Security Program
Classification-HowToBoostInformationProtection
ISO 27001 Training | ISMS Awareness Training
Ad

Viewers also liked (20)

PPTX
Information Security is NOT an IT Issue
PDF
NTXISSACSC3 - Metasploit Year in Review by James Lee
PDF
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
PDF
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
PDF
NTXISSACSC4 - The Art of Evading Anti-Virus
PDF
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
PDF
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
PDF
NTXISSACSC4 - A Day in the Life of a CISO
PDF
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
PDF
NTXISSACSC4 - A Brief History of Cryptographic Failures
PDF
NTXISSACSC4 - Hacking Performance Management, the Blue Green Game
PDF
NTXISSACSC4 - World of Discovery
PDF
NTXISSACSC4 - Day in the Life of a Security Solutions Architect
PDF
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
PPTX
#5 DataBeersBCN -"Location Based Business Oportunity Detector"
PDF
NTXISSACSC4 - How Not to Build a Trojan Horse
PDF
NTXISSACSC4 - Ransomware: History Analysis & Mitigation
PDF
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
PDF
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
PDF
NTXISSACSC4 - Security for a New World
Information Security is NOT an IT Issue
NTXISSACSC3 - Metasploit Year in Review by James Lee
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
NTXISSACSC4 - The Art of Evading Anti-Virus
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - A Day in the Life of a CISO
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - A Brief History of Cryptographic Failures
NTXISSACSC4 - Hacking Performance Management, the Blue Green Game
NTXISSACSC4 - World of Discovery
NTXISSACSC4 - Day in the Life of a Security Solutions Architect
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
#5 DataBeersBCN -"Location Based Business Oportunity Detector"
NTXISSACSC4 - How Not to Build a Trojan Horse
NTXISSACSC4 - Ransomware: History Analysis & Mitigation
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Security for a New World
Ad

Similar to FRSecure Company Overview (20)

PPT
FRSecure Sales Deck
PPTX
Information Security in a Compliance World
PPTX
Information Security For Leaders, By a Leader
PPTX
Information security challenges in today’s banking environment
PPT
Jms secure data presentation
PDF
Trofi Security Service Catalogue (1)
PPTX
c~Sharpe Security Services
PPTX
ISO 27001 - Information security user awareness training presentation - part 3
PDF
6 things you probably didn't know about iso 27001 certification in the nether...
PDF
Brandon Consulting Overview
PPTX
What Is the Scope of ISO 27001 Certification in the Netherlands.pptx
DOC
Ttss consulting(1)
PDF
Jms secure data presentation
PPT
IT Security Strategy
PPT
IT Security Strategy
PDF
IS3 Capabilities Brief
PDF
Security For Free
PDF
Cyber security infotech profile
PPTX
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
PDF
CISSO Certification| CISSO Training | CISSO
FRSecure Sales Deck
Information Security in a Compliance World
Information Security For Leaders, By a Leader
Information security challenges in today’s banking environment
Jms secure data presentation
Trofi Security Service Catalogue (1)
c~Sharpe Security Services
ISO 27001 - Information security user awareness training presentation - part 3
6 things you probably didn't know about iso 27001 certification in the nether...
Brandon Consulting Overview
What Is the Scope of ISO 27001 Certification in the Netherlands.pptx
Ttss consulting(1)
Jms secure data presentation
IT Security Strategy
IT Security Strategy
IS3 Capabilities Brief
Security For Free
Cyber security infotech profile
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
CISSO Certification| CISSO Training | CISSO

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
A Presentation on Artificial Intelligence
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation theory and applications.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Big Data Technologies - Introduction.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
Teaching material agriculture food technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
Dropbox Q2 2025 Financial Results & Investor Presentation
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
A Presentation on Artificial Intelligence
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Encapsulation_ Review paper, used for researhc scholars
Unlocking AI with Model Context Protocol (MCP)
Review of recent advances in non-invasive hemoglobin estimation
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation theory and applications.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
cuic standard and advanced reporting.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Big Data Technologies - Introduction.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Teaching material agriculture food technology
Digital-Transformation-Roadmap-for-Companies.pptx
NewMind AI Monthly Chronicles - July 2025

FRSecure Company Overview

  • 1. Company Overview: • Organizational History • What We Do • How We Do It • Assessment Services • Consulting Services • Compliance Services Your Security. Our Passion. • Description of Professionals • Client Profiles www.FRSecure.com | 952-442-1709
  • 2. Organizational History FRSecure is a full-service information security consulting company. The company was established in the spring of 2008 by a group of seasoned information security professionals who sought to provide the type of consultant “we wished we had when we were building and managing our own information security programs”. www.FRSecure.com | 952-442-1709
  • 3. What We Do As an information security consulting company, we help businesses find and fix vulnerabilities. "Information Security“ Defined: • Information - your intangible assets. People usually assume this means data, which it does, but it also includes hard copy information and the stuff in your head. Basically, think about any information that if you lost it your business would suffer. That's what we protect. • Security - keeping that information confidential, accurate, and available. www.FRSecure.com | 952-442-1709
  • 4. How We Do It We focus on security in 5 major areas: Policy and Procedures • Administrative Security • Policy & procedure External • Sometimes called General Controls Physical IT Security • Physical Security Core Security • External IT Security • Internal IT Security Data • Application Security Software Internal IT Security Security www.FRSecure.com | 952-442-1709
  • 5. How We Do It We perform assessments of your security in those five areas. If we find problems, we report them to you along with our recommendations on how they can be resolved. Should you need or want help resolving those issues, we do that through our consulting services. www.FRSecure.com | 952-442-1709
  • 6. Assessment Services We perform the following types of assessments: • Information Security • Compliance • Administrative (General) Controls • Physical Security • Internal Network Security • External Network Security • Application Security • Small Business Security www.FRSecure.com | 952-442-1709
  • 7. Consulting Services FRSecure offers security consulting services such as: • Security Health Checkup • Outsourced Security Program Design and Development • Vendor Risk Management • Penetration Testing • Policy Creation • SAS70/SSAE16 Readiness • BC/DR Planning and Testing • Incident Response • And much more… www.FRSecure.com | 952-442-1709
  • 8. Compliance Services FRSecure offers the following compliance solutions: • Financial Services Compliance Solutions (GLBA/FFIEC and FinCEN) • Healthcare Compliance Solutions (HIPAA) • Utilities Compliance Solutions (NERC CIP) • Education Compliance Solutions (FERPA) • Government Compliance Solutions (FISMA, NIST, and FIPS) • Payment Card Industry Compliance Solutions (PCI) • ISO/IEC 27001 Compliance • ISO/IEC 27036 Compliance • Customer Compliance www.FRSecure.com | 952-442-1709
  • 9. Description of Professionals All information security professionals working for FRSecure have, at a minimum: • A valid, and active Certified Information Security Systems Professional (“CISSP”) certification, • Real-world information security experience; building, managing, and improving information security programs for which they have been directly responsible for, • An average more than 10 years of information security practitioner experience, and; • A passion for helping clients solve information security challenges. Additionally, FRSecure’s professionals have real-world experience working in and for a wide range of organizations; from the Fortune 500 to the small community bank, and everything in between. www.FRSecure.com | 952-442-1709
  • 10. Client Profiles FRSecure has worked with hundreds of organizations ranging in size from 5 to more than 250,000 employees; both publicly and privately-owned. Some of the more notable organizations include Wells Fargo, U.S. Bank, UnitedHealth Group, ADP, ADC, First Data, and Eisai. Although FRSecure has extensive experience working with organizations of all sizes, we specialize in working with organizations that fit the following profile: • Organizations with less than 10,000 employees • Organizations with compliance, intellectual property protection, and/or customer-specific security needs • Organizations with a need to compliment in-house information security expertise • Organizations with information security budget constraints • Organizations that require or prefer an independent opinion or review www.FRSecure.com | 952-442-1709