Profile

Kathy CyberSec Consulting, LLC

At the core of a Kathys Cyber Security Consulting is risk management. As data breaches occur frequently, putting sensitive information at risk, security consultants are responsible for ensuring a data breach does not occur. The consultants stay…
At the core of a Kathys Cyber Security Consulting is risk management. As data breaches occur frequently, putting sensitive information at risk, security consultants are responsible for ensuring a data breach does not occur. The consultants stay current on technical trends.
- Security architecture –build company's overall security on multiple platforms, use technical expertise to create architecture te for the business' needs
- Endpoint security skills – build solutions addressing risk at multiple points of entry
- Computer coding – conversant in programming languages
- Communication skills – convey complicated technical information to teams, possessing strong communications skills
- Technical expertise – analytical with ability to discern risks and solutions in networks and systems

kathryn salazar
Our Story
Coming soon.