CyberSecurity: Locked or Unlocked?

CyberSecurity: Locked or Unlocked?

CyberSecurity: Locked or Unlocked?CyberSecurity: Locked or Unlocked?CyberSecurity: Locked or Unlocked?

About Siren Defense

Technical Experience

Our Team has over 25 years experience assisting companies like yours with assessing your current security architecture and ensuring your existing framework supports your enterprise goals, requirements, 

and risk tolerance. 

Cybersecurity Solutions

We help to ensure your organization complies with any and all of the regulatory requirements, (GLBA, HIPAA, IFRS, GDPR, etc.)

Demonstrated expertise and experience in the planning, administration, and follow-up of each of these listed areas; 

PCI, On-Demand Application Security Testing, Data Classification, etc.

Our Commitment

We are committed to you, our customers, and that's why we are vendor agnostic. We only make recommendations specific to your needs.  We act as the firewall between the vendors and our customers. We maintain up-to-date awareness of new and revised security solutions, identify new attacks or threats, and inform our customers 

of the potential impacts.


Services

Value-added Consulting

The key to our success is in providing “valued-added” consulting. The critical component is to accurately determine the right tool for your team, for your company, for your risk appetite; crucial questions to the operationalization of any investment. We take the time to understand the options, their strengths and opportunities, and match them to your team and your needs. 


Siren has the practical experience of implementing technologies and living through the unintended consequences or hidden complexities that arise with any integration and investment.


We also assist in the creation of business justifications from a functional and 

budgetary perspective.  

Security Architecture

 Siren has built IT and security architectures for several Fortune 200 companies. Tools, processes, and people do not ensure success. It is critical to organize them effectively and efficiently to your business environment and your skills on-hand. 


A security architecture must be complimentary to your overall architecture and enable business services, while providing easily integrated and consumable services to provide as transparent of controls as possible.  

Third-party Management

Third-party management is not just about conducting a security assessment of vendors. It is a process that establishes a comprehensive assessment capability to account for legal risks, financial stability, availability of critical functions, and associated security risks. 


This is a critical component to help establish 

long-term, and beneficial partnerships with 

key partners.

Our Team

image8

Oksana oleksyszyn

  

Ms. Oksana Oleksyszyn has held Director of Sales and Sales Operations roles at some of the leading IT distributors, including Insight, PCMall, HP/Compaq, MicroWarehouse/CDW, Best Buy, and Thomson Reuters. With 20 years of experience in IT product and services sales organizations, Oksana has well-established relationships with key vendors and distribution partners. She has built highly successful sales organizations at the beginning stages of their respective B2B growth strategies, and established processes and programs to ensure high levels of customer satisfaction and success. Oksana currently serves on several projects with the local Rotary Club, serving the educational community in Prior Lake. 

image9

Chad rittenour


Mr. Chad Rittenour CISSP, CCSP, is an Air Force veteran, has over 20 years’ experience in IT and had held varied positions managing IT infrastructures.  Most recently, he is involved with incident response for a Fortune 50 company. Additionally, he is an adviser for several emerging, innovative security technology companies. Chad's passion for security has led him to share that knowledge with students as an adjunct professor. 

image10

Nikki meyers

With over 21 years of experience in sales and technology, Nikki has spent her time in a variety of roles at Best Buy. Her expertise spans from sales management, process operationalization and optimization, asset protection, B2B sales, training and communication, to financial and budgetary planning. She has worked with many executive leaders, consulting with them on their specific needs, and making recommendations to their business. These recommendations have led to an increase in sales YoY in a variety of different areas, as well as financial savings. Specifically, Nikki has worked closely with the Risk and Information Security team at Best Buy, serving as an expert for the voice of the retail stores. Nikki’s main goal is to build meaningful relationships with clients, and help understand their business in order to provide the best solution possible for their needs, as well as ongoing support. In her spare time, she and her husband have a small pack of rescue dogs who get a lot of hikes, they all deeply enjoy the outdoors and adventure. 

image11

bill edinger

Bill joined Viatuta in October, after consulting with various businesses for the last 7yrs. As an executive with over 20+ years of experience, he has a proven track record of delivering results, creating enterprise value, and rebuilding underperforming businesses. Bill has implemented IT security protocols in multiple organizations throughout his career. The value in leveraging data to optimize performance is a “must have” in today’s fast pace environments. As an executive leader, Bill has taken pride in building strong leadership teams that transformed and improved company’s success in sales and operations. “There is no substitute for analytics, helping clients improve their results is my passion.” Bill’s career spanned companies that ranged from start-ups to multi-billion dollars in revenues, including: PCM(PCMI), Hewlett Packard(HPQ), Best Buy(BBY), Thomson Reuters(TRI), TABcom and Sun Communities, Inc. Bill is currently serving as a Board Member with Future for Kids (www.futureforkids.org).

Contact Us

Let us help!