Certerion Consulting

About

Certerion is a global virtual IT consulting service started by Sven Berglund (CISSP | CISA | CCSP | ITILv4).
With background in Cyber and information security, Software engineering, Product development, IT architecture, Systems Integration, Team leadership, Agile facilitation and tutoring.
And a career spanning 3 continents working in 3 languages 🇬🇧 🇪🇸 🇸🇪

About us

Certerion's mission is to in a lean manner help medium sized companies implement and maintain security, best practices and compliance.
Working along the entire cycle of:

  • IT Strategy and technology choices.
  • Architecture and development.
  • Quality assurance, security assessments and audits.
  • Operations and continuity.

Together we can: Strengthen your security posture and up your game in IT Service management.
Keep your projects running agile and your operations lean while ensuring adherence to regulations, policies and best practices.
Stay on top of your technical project scopes.

Member of: ISACA, ISC2, AXELOS

CISSP
CISA
CCSP
ITIL4
ITIL4 Strategist
ISC2
ISACA
AXELOS

200% has been the yearly increase in downtime caused by ransomware attacks since 2018 [purplesec.us]

68% of business leaders feel their cybersecurity risks are increasing [Accenture - Cost of cybercrime stydy 2019]

47% of surveyed organizations experience lack of qualified staff as one of their major operational security headaches [ISC2 - 2020 Cloud Security Report]

Services

Get in touch to discuss scaling of the below services to meet your needs:

CISO as a Service

A CISO as a Service offering is about contractually taking on all or some of the typical tasks and responsibilities of the Chief Information Security Officer. For any organization where the CISO role is not dimensionable for a full time hire, a fractional and/or virtual engagement can be the ideal option.
 Download Service Brief.
 CISOaaS "light" Service Brief.
 CISOaaS "light" Resumen de servicio - en español.

IT Sourcing

Whether it's about obtaining a product, a SaaS or sourcing a development partner. With responsible product and system ownership. Continuous review of requirements and project risks. Phased rollouts and iterative integrations. Doing it right will minimize efforts wasted and help avoid good money being thrown after bad.

Vulnerability MGMT

Vulnerability management is a continuous, proactive process that keeps your computer systems, networks, and enterprise applications safe from cyberattacks and data breaches. As such, it is an important corner stone of your overall security program.
Sven Berglund is hired for Vulnerability Management consulting assignments via
 Tenable Professional Services, US.

Contact

Use the below links to get in touch. Let's talk Cyber Security, Software Engineering, IT Service Management.


LinkedIn:

☛ Connect ☚

Email:

sven@certerion.com

GitHub:

☛ Follow ☚

Credly:

☛ Verify ☚

Contact us