Content tabs module

The near-continuous pace of cyber attacks and the irreparable damage they can cause to your business requires your organization to continuously monitor your users and assets. And even then, there is no path to absolute protection.

Trexin focuses on pragmatic, effective cybersecurity, starting with an assumption that your systems already have been compromised. This mindset shifts the focus from “prevention/detection” to “detection/response”, keeping your Information Security team focused on continuing business delivery even while compromised in various ways. That is not to say that prevention is no longer crucial—it is. Intelligence collection, monitoring, analysis, diligence, and improvement are never-ending elements of an effective strategy.

The Trexin Cybersecurity domain partners with your organization’s leaders to implement a targeted cybersecurity approach that prioritizes real world threats without introducing a complicated and prohibitively costly security organization or tooling. We help you ensure your cybersecurity investments and strategies are effective and aligned with your industry’s norms.

Glenn Kapetansky

Senior Principal, Chief Security Officer, Technology Capability Lead

Glenn Kapetansky has a passion for building systems, organizations, and teams that endure, and has done so across a number of business sectors, technologies, and roles. For over 20 years, Glenn has advised senior executives and built teams throughout the delivery cycle: strategy, project planning, financials, architecture, development, quality assurance, deployment, and operational support. His credentials were earned in such diverse industries as healthcare, finance, energy, consumer products, and telecommunications. Glenn’s current focus areas are agile management, data protection, and audit/regulatory compliance.

Glenn speaks and publishes on occasion. He has been named numerous times in various Who’s Who, and is a repeat recipient of Bell Labs’ Arno Penzias Award for Innovation in the Marketplace. He is active in CIO Roundtables, CISO Chicago, the Chicago Life Sciences Consortium, and the Technology Leaders’ Association. Glenn’s certifications and memberships include IEEE, (ISC)2 (CISSP), ISACA (CISA, CDPSE), and ITIL (SM).

Help section

Help me assess the risk to my organization

Trexin partners with your organization’s key stakeholders (Business and Technical) to assess your risk within the context of your market segment, your company’s strategic placement in that segment, and regulatory requirements. The resulting assessment helps you:

  • Identify and prioritize targeted data, system, and network assets.
  • Determine level of vulnerability and impact of a potential breach of those assets.
  • Prioritize defenses and response strategies to ensure your business remains operational during attempted attacks or actual breaches.

Areas of Expertise:

  • Cyber Risk Gap Analysis
  • Technology Risk Assessment
  • Vulnerability Assessment
  • “Metrics that Matter” Dashboard Design

Help me operationalize action plans

Trexin defines immediate, actionable plans based upon the latest cyber intelligence and telemetry data to improve your overall defensive posture with a special focus on ensuring that your organization does not become “just another victim” of known attacks.

  • Execute business and IT security goals.
  • Enable cyber framework and security architecture to proactively identify and control cyber risk.
  • Verifiably become compliant with regulatory and legal mandates. Maintain compliancy with modest effort in an evolving landscape. Keep Boards and stakeholders transparently informed of status and progress.

Areas of Expertise:

  • Interim Leadership/Succession Planning
  • Security Architecture
  • Key Program Execution
  • Cyber Risk Management Framework
  • Key Risk Indicators (KRI) Framework
  • Cybersecurity Training

Help me improve readiness and resiliency to a cyber breach

Trexin will design and implement your controls program and will help your organization monitor its environment to confirm that those controls remain effective.

  • Ongoing testing, validation, remediation, improvement, and actionable reporting.
  • Breach prevention measures supplemented by rapid and robust response and containment capabilities that ensure ongoing business operations.
  • Ongoing adaptation to the evolving threat actors and attack vectors.

Areas of Expertise:

  • Targeted Incident Response
  • Improved Incident Response Process
  • Prioritized Action Plans
  • Execution, and Red/Blue (+Purple Team Exercises
  • Fraud Detection
  • Business Continuity
  • Disaster Recovery
Ransomware

Ransomware

Isabelle Primer, a member of Trexin’s Healthcare & Life Sciences Practice, partnered with Chief Security Officer and Technology Capability Lead, Glenn Kapetansky, to break down the ‘five W’s and one H’ of the rapidly growing issue of ransomware.

Tagged in: Healthcare & Life Sciences, Technology
Social Media Accounts