Logical Writing Solutions, Inc.
  • Home
  • About Ann
  • About Us
  • Why Us
  • Deliverables
  • Case Studies
  • Blog
  • Fav Quotes
  • Contact

Deliverables

Communication for Security & Compliance Firms
White papers, blog posts, & other marketing content: Generate leads, promote community, and build brand awareness with engaging content. Challenges addressed: Minimal lead generation. Failure to connect with the C suite and enterprise leaders. Technical white papers that don't resonate with the audience. 

​Proposals, RFP Responses, Presentations, & Other Sales Content: Win bigger projects, more often, faster, and with less effort by clearly demonstrating your capabilities. Challenges addressed: Sales are lost when they should be won. Low win ratios. Low proposal and presentation scores. Small deal sizes. High effort per deliverable..
Communication for Enterprises
Security & compliance policies, procedures, process flows, security reports, & training (HIPAA, ISO, PCI DSS, & more): Reduce the impact of your largest compliance and security risk – your humans. Challenges addressed: Complex compliance and security scenarios. Undocumented process workflows. Disjointed compliance or security efforts, especially for international organizations. Unremediated audit findings.
​
​Software requirements and other IT operations documentation: Whether you are implementing a Service Management Office or need documentation for your ticketing system or incident response plan, we can help. Challenges addressed: Ineffecient IT operations. Half-implemented service management offices. Immature business and system requirements. Project management plans that aren't realistic or don't identify critical dependencies.
​
wHAT'S YOUR CHALLENGE? contact us

Sample White Paper and Blog Topics

Ann and her team edit and write about a breadth of security and compliance topics including: ​
  • Alert fatigue
  • Architecture reviews for security: Network, application, device, and more
  • Authentication and authorization
  • Breach reporting
  • Cyber attacks
    • Attack surface
    • CEO Scam / Finance
    • Malicious insiders
    • Nation state adversaries
    • OWASP Top 10
    • Phishing and Whaling
    • Social engineering
    • Targeted
    • Zero day
  • Behavioral analytics in security
  • Cloud security
  • Compliance: HIPAA, Sarbanes-Oxley (SOX), PCI DSS Requirement 11.3, and more
  • Configuration reviews for security
  • Encryption
  • Endpoint security
  • Forensics
  • Fraud detection and fraud intelligence
  • Governance, Risk and Compliance platforms
  • ​Healthcare security: Hospitals, provider groups, medical systems, insurers, and more​
  • Identity and Access Management (IAM)
  • Identity risk I
  • Incident response workflows: Privacy and security
  • Kiosk and ATM security
  • Log and event monitoring
  • Malware detection
  • Manufacturing and SCADA security
  • Microsoft Security Development Lifecycle (SDL)
  • NetFlow monitoring
  • Network segmentation
  • Open source security
  • Packet analysis
  • Penetration testing and security for:
    • Back-end systems
    • Databases
    • Embedded devices
    • Industrial Control Systems (ICS)
    • Internet of Things (IoT)
    • Mobile applications
    • Networks (internal and external)
    • Smart and connected technologies
    • Virtual technology
    • Web applications
    • Web services and Application Programming Interfaces (APIs)
    • Wireless networks
  • Ransomware (of course!)
  • Red team reviews
  • Smart car, smart meter/smart grid, and smart city security
  • Security controls: Defensive (perimeter) and preventative 
  • Security Information and Event Management (SIEM) systems
  • Shadow IT
  • Software composition analysis
  • Source code reviews
  • Supply chain security
  • Third-party risk
  • Threat detection and response
    • Automated threat analysis
    • Hash-based detection
    • Predictive detection which identifies never-seen/zero day attacks
    • Signature-based detection
  • Threat intelligence: Crowd sourced and research based
  • Threat modeling
  • Virtual browsers, virtual desktops, and virtual servers
contact us; let's talk
​© copyright 2021 Logical Writing Solutions, Inc.
  • Home
  • About Ann
  • About Us
  • Why Us
  • Deliverables
  • Case Studies
  • Blog
  • Fav Quotes
  • Contact