Consultants & Service Providers: Difference between revisions
No edit summary |
No edit summary |
||
Line 3: | Line 3: | ||
== 1. (ISC)² Chapter == | == 1. (ISC)² Chapter == | ||
'''(ISC)² Chapter''' refers to local chapters of the International Information System Security Certification Consortium, Inc. ((ISC)²). These chapters often organize volunteer activities and events focused on cybersecurity education and networking. [Link to (ISC)² Chapter Website] https://www.isc2.org/ | '''(ISC)² Chapter''' refers to local chapters of the International Information System Security Certification Consortium, Inc. ((ISC)²). These chapters often organize volunteer activities and events focused on cybersecurity education and networking. [Link to (ISC)² Chapter Website] https://www.isc2.org/ | ||
== 2. OWASP (Open Web Application Security Project) == | == 2. OWASP (Open Web Application Security Project) == | ||
'''OWASP''' (Open Web Application Security Project) is a global nonprofit organization that concentrates on improving the security of software. They offer numerous volunteer opportunities for security enthusiasts and developers. [Link to OWASP Website] https://owasp.org/ | '''OWASP''' (Open Web Application Security Project) is a global nonprofit organization that concentrates on improving the security of software. They offer numerous volunteer opportunities for security enthusiasts and developers. [Link to OWASP Website] https://owasp.org/ | ||
== 3. DefCon == | == 3. DefCon == | ||
'''DefCon''' is well-known for its hacker conference, but it also has several volunteer groups and initiatives that focus on cybersecurity awareness and education. [Link to DefCon Website] https://defcon.org/ | '''DefCon''' is well-known for its hacker conference, but it also has several volunteer groups and initiatives that focus on cybersecurity awareness and education. [Link to DefCon Website] https://defcon.org/ | ||
== 4. Hackers for Charity == | == 4. Hackers for Charity == | ||
'''Hackers for Charity''' combines the skills of hackers with the desire to help others. They work on various projects, including cybersecurity training for nonprofits and humanitarian causes. [Link to Hackers for Charity Website] https://hackersforcharity.org/ | '''Hackers for Charity''' combines the skills of hackers with the desire to help others. They work on various projects, including cybersecurity training for nonprofits and humanitarian causes. [Link to Hackers for Charity Website] https://hackersforcharity.org/ | ||
== 5. Electronic Frontier Foundation (EFF) == | == 5. Electronic Frontier Foundation (EFF) == | ||
The '''Electronic Frontier Foundation (EFF)''' is an international civil liberties organization dedicated to defending digital privacy, free expression, and innovation. They often welcome volunteers to help with legal and advocacy efforts. [Link to EFF Website] https://www.eff.org/ | The '''Electronic Frontier Foundation (EFF)''' is an international civil liberties organization dedicated to defending digital privacy, free expression, and innovation. They often welcome volunteers to help with legal and advocacy efforts. [Link to EFF Website] https://www.eff.org/ | ||
== 6. Citizen Lab == | == 6. Citizen Lab == | ||
'''Citizen Lab''', based at the Munk School of Global Affairs at the University of Toronto, investigates digital threats and promotes cybersecurity and human rights. They may have opportunities for volunteers with technical and research skills. [Link to Citizen Lab Website] https://www.citizenlab.co/ | '''Citizen Lab''', based at the Munk School of Global Affairs at the University of Toronto, investigates digital threats and promotes cybersecurity and human rights. They may have opportunities for volunteers with technical and research skills. [Link to Citizen Lab Website] https://www.citizenlab.co/ | ||
== 7. The Tor Project == | == 7. The Tor Project == | ||
'''The Tor Project''' is known for its privacy-focused web browser. They rely on volunteers to maintain and improve their software and network, enhancing online anonymity and security. [Link to The Tor Project Website] https://www.torproject.org | '''The Tor Project''' is known for its privacy-focused web browser. They rely on volunteers to maintain and improve their software and network, enhancing online anonymity and security. [Link to The Tor Project Website] https://www.torproject.org | ||
== 8. National Cyber Security Alliance (NCSA) == | == 8. National Cyber Security Alliance (NCSA) == | ||
The '''National Cyber Security Alliance (NCSA)''' is a U.S.-based nonprofit organization that focuses on promoting cybersecurity awareness. They may have opportunities for volunteers to participate in educational campaigns and events. [Link to NCSA Website] https://staysafeonline.org/ | The '''National Cyber Security Alliance (NCSA)''' is a U.S.-based nonprofit organization that focuses on promoting cybersecurity awareness. They may have opportunities for volunteers to participate in educational campaigns and events. [Link to NCSA Website] https://staysafeonline.org/ | ||
== 9. Women in CyberSecurity (WiCyS) == | == 9. Women in CyberSecurity (WiCyS) == | ||
While primarily a professional organization, '''Women in CyberSecurity (WiCyS)''' often welcomes volunteers to help with their mission of increasing the representation of women in cybersecurity. [Link to WiCyS Website] https://www.wicys.org/ | While primarily a professional organization, '''Women in CyberSecurity (WiCyS)''' often welcomes volunteers to help with their mission of increasing the representation of women in cybersecurity. [Link to WiCyS Website] https://www.wicys.org/ | ||
= Commercial Cybersecurity Consultants = | |||
==1. Accenture== | |||
Accenture is a global professional services company that provides a broad range of services and solutions in strategy, consulting, digital, technology and operations. Accenture Security helps clients protect their data, systems and people against cyber threats. [https://www.accenture.com/us-en/careers/explore-careers/area-of-interest/cybersecurity-careers] | |||
==2. Deloitte== | |||
Deloitte is one of the world's leading professional services networks. Deloitte's cybersecurity practice helps clients assess their security posture, identify and mitigate risks, and respond to incidents. [https://www.deloitte.com/global/en/services/risk-advisory/services/cyber-risk.html] | |||
==3. EY== | |||
EY is a global leader in assurance, tax, strategy and consulting services. EY's cybersecurity practice helps clients protect their data, systems and people against cyber threats. [https://www.ey.com/en_us/cybersecurity] | |||
==4. KPMG== | |||
KPMG is one of the world's leading professional services networks. KPMG's cybersecurity practice helps clients assess their security posture, identify and mitigate risks, and respond to incidents. [https://advisory.kpmg.us/services/cyber-security-services.html] | |||
==5. PwC== | |||
PWC is a global leader in assurance, tax and consulting services. PwC's cybersecurity practice helps clients protect their data, systems and people against cyber threats. [https://www.pwc.com/gx/en/issues/cybersecurity.html] | |||
==6. CrowdStrike== | |||
Crowdstrike is a cybersecurity company that provides cloud-native endpoint protection and threat intelligence. CrowdStrike's consulting services help clients assess their security posture, identify and mitigate risks, and respond to incidents. [https://www.crowdstrike.com/services/] | |||
==7. Mandiant== | |||
Mandiant is a cybersecurity company that provides incident response, consulting and managed defense services. Mandiant's consulting services help clients assess their security posture, identify and mitigate risks, and respond to incidents. [https://www.mandiant.com/consulting] | |||
==8. Rapid7== | |||
Rapid7 is a cybersecurity company that provides application security, cloud security and incident detection and response solutions. Rapid7's consulting services help clients assess their security posture, identify and mitigate risks, and respond to incidents. [https://www.rapid7.com/solutions/consulting-services/] | |||
==9. aizoOn== | |||
aizoOn is a cybersecurity company that provides consulting, managed security and incident response services. aizoOn's consulting services help clients assess their security posture, identify and mitigate risks, and respond to incidents. [https://www.aizoongroup.com/services] | |||
==10. Kroll== | |||
Kroll is a global leader in risk mitigation services. Kroll's cybersecurity practice helps clients assess their security posture, identify and mitigate risks, and respond to incidents. [https://www.kroll.com/en/services/cybersecurity] | |||
==11. Protiviti== | |||
Protiviti is a global consulting firm that provides risk management, compliance, internal audit and business and technology consulting services. Protiviti's cybersecurity practice helps clients assess their security posture, identify and mitigate risks, and respond to incidents. [https://www.protiviti.com/us-en/cybersecurity-consulting] |
Revision as of 02:46, 19 September 2023
Volunteeer Organizations
1. (ISC)² Chapter
(ISC)² Chapter refers to local chapters of the International Information System Security Certification Consortium, Inc. ((ISC)²). These chapters often organize volunteer activities and events focused on cybersecurity education and networking. [Link to (ISC)² Chapter Website] https://www.isc2.org/
2. OWASP (Open Web Application Security Project)
OWASP (Open Web Application Security Project) is a global nonprofit organization that concentrates on improving the security of software. They offer numerous volunteer opportunities for security enthusiasts and developers. [Link to OWASP Website] https://owasp.org/
3. DefCon
DefCon is well-known for its hacker conference, but it also has several volunteer groups and initiatives that focus on cybersecurity awareness and education. [Link to DefCon Website] https://defcon.org/
4. Hackers for Charity
Hackers for Charity combines the skills of hackers with the desire to help others. They work on various projects, including cybersecurity training for nonprofits and humanitarian causes. [Link to Hackers for Charity Website] https://hackersforcharity.org/
5. Electronic Frontier Foundation (EFF)
The Electronic Frontier Foundation (EFF) is an international civil liberties organization dedicated to defending digital privacy, free expression, and innovation. They often welcome volunteers to help with legal and advocacy efforts. [Link to EFF Website] https://www.eff.org/
6. Citizen Lab
Citizen Lab, based at the Munk School of Global Affairs at the University of Toronto, investigates digital threats and promotes cybersecurity and human rights. They may have opportunities for volunteers with technical and research skills. [Link to Citizen Lab Website] https://www.citizenlab.co/
7. The Tor Project
The Tor Project is known for its privacy-focused web browser. They rely on volunteers to maintain and improve their software and network, enhancing online anonymity and security. [Link to The Tor Project Website] https://www.torproject.org
8. National Cyber Security Alliance (NCSA)
The National Cyber Security Alliance (NCSA) is a U.S.-based nonprofit organization that focuses on promoting cybersecurity awareness. They may have opportunities for volunteers to participate in educational campaigns and events. [Link to NCSA Website] https://staysafeonline.org/
9. Women in CyberSecurity (WiCyS)
While primarily a professional organization, Women in CyberSecurity (WiCyS) often welcomes volunteers to help with their mission of increasing the representation of women in cybersecurity. [Link to WiCyS Website] https://www.wicys.org/
Commercial Cybersecurity Consultants
1. Accenture
Accenture is a global professional services company that provides a broad range of services and solutions in strategy, consulting, digital, technology and operations. Accenture Security helps clients protect their data, systems and people against cyber threats. [1]
2. Deloitte
Deloitte is one of the world's leading professional services networks. Deloitte's cybersecurity practice helps clients assess their security posture, identify and mitigate risks, and respond to incidents. [2]
3. EY
EY is a global leader in assurance, tax, strategy and consulting services. EY's cybersecurity practice helps clients protect their data, systems and people against cyber threats. [3]
4. KPMG
KPMG is one of the world's leading professional services networks. KPMG's cybersecurity practice helps clients assess their security posture, identify and mitigate risks, and respond to incidents. [4]
5. PwC
PWC is a global leader in assurance, tax and consulting services. PwC's cybersecurity practice helps clients protect their data, systems and people against cyber threats. [5]
6. CrowdStrike
Crowdstrike is a cybersecurity company that provides cloud-native endpoint protection and threat intelligence. CrowdStrike's consulting services help clients assess their security posture, identify and mitigate risks, and respond to incidents. [6]
7. Mandiant
Mandiant is a cybersecurity company that provides incident response, consulting and managed defense services. Mandiant's consulting services help clients assess their security posture, identify and mitigate risks, and respond to incidents. [7]
8. Rapid7
Rapid7 is a cybersecurity company that provides application security, cloud security and incident detection and response solutions. Rapid7's consulting services help clients assess their security posture, identify and mitigate risks, and respond to incidents. [8]
9. aizoOn
aizoOn is a cybersecurity company that provides consulting, managed security and incident response services. aizoOn's consulting services help clients assess their security posture, identify and mitigate risks, and respond to incidents. [9]
10. Kroll
Kroll is a global leader in risk mitigation services. Kroll's cybersecurity practice helps clients assess their security posture, identify and mitigate risks, and respond to incidents. [10]
11. Protiviti
Protiviti is a global consulting firm that provides risk management, compliance, internal audit and business and technology consulting services. Protiviti's cybersecurity practice helps clients assess their security posture, identify and mitigate risks, and respond to incidents. [11]