ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
Personal Information
Organization / Workplace
Greater Los Angeles Area United States
Occupation
Michael Kaishar is an Information Security Engineering, Architecture, Consulting, and Advisory Services
Industry
Technology / Software / Internet
Website
About
Michael Kaishar has professional experience in Information Security, IT Systems, Virtualization, Networks, Storage, and Disaster Recovery Planning. Michael Kaishar was instrumental in the successful delivery of high-level corporate initiatives such as: Information Security Program Development and Implementation, Virtual Infrastructure Design and Deployment, Encrypted Backup Design and Deployment, Disaster Recovery and Business Continuity Planning, Threat and Vulnerability Assessments and Remediation, Regulatory Compliance and Information Assurance. Michael Kaishar believes in providing sensible information security to organizations.
Contact Details

Presentations(4)Ìý

See all
Implementing Two Factor Authentication For Remote Access Using Phone Factor
Implementing Two Factor Authentication For Remote Access Using Phone FactorImplementing Two Factor Authentication For Remote Access Using Phone Factor
Implementing Two Factor Authentication For Remote Access Using Phone Factor
Ìý
Information Security Awareness And Training Business Case For Web Based Solution (Template)
Information Security Awareness And Training Business Case For Web Based Solution (Template)Information Security Awareness And Training Business Case For Web Based Solution (Template)
Information Security Awareness And Training Business Case For Web Based Solution (Template)
Ìý
Layered Approach - Information Security Recommendations
Layered Approach - Information Security RecommendationsLayered Approach - Information Security Recommendations
Layered Approach - Information Security Recommendations
Ìý

Documents(1)Ìý

Implementing Two Factor Authentication Using Phone Factor
Implementing Two Factor Authentication Using Phone FactorImplementing Two Factor Authentication Using Phone Factor
Implementing Two Factor Authentication Using Phone Factor
Ìý