Sept. 19, 2022, 5:36 p.m. | John P. Gormally, SR

Security Boulevard securityboulevard.com


Sunsetting legacy Cybersecurity Process for Better Optimization and Security Modernization
Sunset in Carlsbad California

The idea of “if it isn’t broken, don’t fix it” should not apply to cybersecurity. Most organizations develop three to five-year phasing plans for most IT and cyber products to align with the manufacturer’s end-of-development, end-of-support, and end-of-life product life cycles and keep up with the latest security risks.


What if the process or product is not up to date or aligned with the current threat …

ciso suite compliance cyber cybersecurity governance legacy optimization process risk & compliance risk management security

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Consultant

@ Auckland Council | Central Auckland, NZ, 1010

Security Engineer, Threat Detection

@ Stripe | Remote, US

DevSecOps Engineer (Remote in Europe)

@ CloudTalk | Prague, Prague, Czechia - Remote

Security Architect

@ Valeo Foods | Dublin, Ireland

Security Specialist - IoT & OT

@ Wallbox | Barcelona, Catalonia, Spain