Information & Application

Security

World-Class Software Security Consulting and Training Services

Consulting Services   Training Courses
Enterprise Software Security - Book Cover

How secure are your business software applications?

Preventative Software Security Options

How do you know? Here at KRvW Associates, we take a balanced approach that starts with developing a deep understanding of how your business works, and then recommending a course of action that makes sense directly to you. We’ll help you design, build, deploy, and operate systems that meet your business and security needs.

Developing and implementing effective incident response management is critical for mitigating damages and costs associated with software security breaches. KRvW Associates has extensive experience in Incident Handling and Response Management, and can assist your organization throughout every phase of setting up and running your IR program.

Incident response management and operations

Consulting Services

We provide no-nonsense, down-to-earth consulting support that is actionable and practical. Our services (described below) span a spectrum from hands-on assistance through designing and recommending courses of action.

Read more about our consulting services

Software Security

Let us help you navigate through the maze of information, processes, and technologies that you'll be faced with.

Incident Management

Plan and implement an incident handling capability that meets your needs, your regulatory requirements, and your budget.

Litigation Support

KRvW Associates consultants have significant experience at providing expert litigation support to the legal services community.

Security Engineering

KRvW Associates consultants have years of experience in designing, implementing, and testing secure network architectures.

Training Services

Are you looking for world-class security training, delivered by seasoned professionals who have spent years practicing what they train? We specialize in small classroom, instructor-lead heavily hands-on training that is tailored and customizable to our customers' needs.

View our Full training course details

Break ‘em and Build ‘em Biathlon

2 days each, 12 hours of class time

Custom Training Courses

All courses are tailored to your organizations needs, time requirements and budget.

Pervasive Web Application Security Defects

3 or 4 days - 18 or 24 hours of class time

How can we help?

KRvW consultants have spent years working with organizations of all sizes helping succeed in meaningful ways, and putting in place the levels of information assurance that make sense for them and their customers. KRvW Associates has delivered a proven track record of results to our customers since 2003.

Learn About our team

Kenneth R. van Wyk

Principal Consultant and Founder

Ken is an internationally recognized information security expert and author of three popular books, including Enterprise Security: A Confluence of Disciplines (Pearson, 2014), Secure Coding: Principles and Practices (O’Reilly, 2003), and Incident Response (O’Reilly, 2001). He is also a monthly columnist for Computerworld. Among his numerous professional roles, Ken is a Visiting Scientist at the Software Engineering Institute at Carnegie Mellon University, where he is a course instructor and consultant to the CERT® Coordination Center.

Richard F. Forno

Principal Consultant

Richard Forno is an internationally-recognized security professional whose career in information assurance centers around security program development and management, incident response operations, security awareness, and emerging trends analysis. His career highlights include helping build the first incident response and computer crimes investigation program for the United States House of Representatives and serving as the first Chief Security Officer at Network Solutions, where he designed and managed the global information assurance program for one of the Internet's most critical infrastructures (the InterNIC).

Reacting to all the latest attacks and vulnerabilities can result in a directionless security strategy that ends up slowing down business instead of helping it.

learn the most effective strategy for your company

contact

Feel free to contact us if you are interested in any of our services or have any additional questions. We look forward to hearing from you!

Kenneth R. van Wyk
KRvW Associates, LLC

KRvW Associates, LLC

World-Class|Software Security Consulting and Training Services