Home Contact Sitemap

BLACK SWAN TECHNOLOGIES LLC

Managed Information Security Services

877-300-3798

What we do...

Black Swan Technologies, LLC utilizes a true holistic approach to security and can provide the third-party Information Security Assurance and Due Diligence needed in a demanding regulated compliance-driven industry. By commanding the Information Security’s highest certification; CISSP-Certified Information Systems Security Professional, your company will be able to demonstrate Due Care efforts have been taken to safeguard assets that will be recognized by Auditors and Examiners.

Preparing for the Unexpected...

imgBlack Swan comes from the 17th century European assumption that 'All swans are white'. In that context, a black swan was a symbol for something that was impossible or could not exist. In the 18th Century, the discovery of black swans metamorphosed the term to connote that a perceived impossibility may actually come to pass. The Black Swan Theory[1] concerns high-impact, hard-to-predict, and rare events beyond the realm of normal expectations. …almost all consequential events in history come from the unexpected.  Banks and trading firms are very vulnerable to hazardous Black Swan events and are exposed to losses beyond that predicted by their models.  Almost all major scientific discoveries, historical events, and artistic accomplishments are "black swans"—undirected and unpredicted.  The rise of the Internet, the personal computer, World War I, and the September 11, 2001 attacks as examples of Black Swan events.[1]

 
Comments (1) . 05 Jan 2010 . 10:37

Security Policy Development

Company. Policy:
  • Dept Policy
  • Standards
    • Procedures
    • Guidelines

Why Do You Need a Security Policy? Who is responsible for securing an organization's information? Perhaps the Research and Evaluation department? Not exactly. The Management Information System (MIS) staff? Wrong again. Ultimately, it is not only individual employees or departments that are responsible for the security of confidential information, but also the institution itself. It is, therefore, incumbent upon top administrators, who are charged with protecting the institution's best interests, to ensure that an appropriate and effective security policy is developed and put into practice throughout the organization.

Comments (1) . 07 Jan 2010 . 02:56