top of page

ABOUT RISK CYPHER

At Risk Cypher, we are devoted to keeping our clients and their data safe, secure, and compliant. Our team of security experts are skilled in the latest technologies and industry standards, ensuring that our clients receive the best service possible. Whether you need an assessment of your current security protocols, advice on a new security strategy, or a comprehensive review, we are here to help.

Contact us today to learn more about how Risk Cypher can help you protect your most valuable assets.

 

Vector Smart Object.png

OUR STORY

strip543.png

Risk Cypher brings us all together.

Our team comprises bright and like-minded individuals who have come together to explore endless possibilities. We come from a variety of different fields and technical backgrounds, yet our passion for Risk Cypher ties us all together. Check out some of the people who make Risk Cypher the fantastic company it truly is.

logostrip.png

MEET THE LEADERSHIP TEAM

abtimg2.jpg

Founder And CEO

Ron Powell, MBA

Over 15 years of Information Security and Technology Risk Management leadership experience.

Industry:

DoD, Consumer Packaged Goods, Energy, Banking and Financial Service

Education:

MBA from The University of Alabama BSBA from St. Louis University

Certifications:

CISSP, CEH, CFE, ITIL

  • Linkedin

Co-Founder and COO

Titus Rhode

Over 10 years of Risk Management leadership experience, specializing in strategic and operational solutions development.

Industry:

Consumer Packaged Goods, Entertainment / Video Games, Banking, and Financial Services

Education:

BS, International Business from Pepperdine University

  • Linkedin
abtimg3.jpg
abtimg4.jpg

Director of Technology Risk Management

Galina Petro

Over 15 years of Information Security and Technology Risk Management leadership experience.

Industry:

Consumer Packaged Goods, Entertainment, Broadcasting, Banking and Financial Services

Education:

BS, Management Information Systems, CSUN

Certifications:

CRISC - Certified in Risk and Information Systems Control

Membership:

ISACA

  • Linkedin
bgabtnew.jpg

OUR MISSION AND VISION

missionstrip.png
strip543.png

Mission:

At Risk Cypher, we believe that business intelligence must be paired with emotional intelligence to truly understand and manage risk. We help businesses make data-driven risk management decisions considering the human factor to minimize risk and maximize success.

strip543.png

Vision

The Risk Cypher vision is to set the standard in the professional services industry by providing best-in-class risk and security services that advance your company’s strategic advantage.

abtimg6.png

CORE VALUES

Our Core Values represent our corporate culture.

We put our clients first by ensuring they see a return on their investment; we achieve this by leveraging industry best practices, consistently holding ourselves to the highest standards, and continually looking for new techniques to advance our professional services.

vl5.jpg
icoa1.png

ROI

vl3.jpg
icoa2.png

BEST PRACTICE

vl2.jpg
icoa3.png

CONSISTENCY

vl4.jpg
icoa4.png

CONTINEUS
PROGRESS

logostrip.png

WE FOLLOW: TECHNOLOGY

RISK MANAGEMENT BEST PRACTICE

  • Risk Governance
    Risk Identification The 2nd Line of Defense possesses an updated risk register to reflect IT’s overall risk portfolio. Risk identification exercises are conducted bi-annually by the 1st Line of Defense. The IT risk register is developed and updated collaboratively with key business stakeholders. Risk events are brainstormed using high-level IT risk categories and refined using COBIT 5 IT processes.
  • Risk Assessment
    Risk Identification The 2nd Line of Defense possesses an updated risk register to reflect IT’s overall risk portfolio. Risk identification exercises are conducted bi-annually by the 1st Line of Defense. The IT risk register is developed and updated collaboratively with key business stakeholders. Risk events are brainstormed using high-level IT risk categories and refined using COBIT 5 IT processes.
  • Risk Response
    Risk Identification The 2nd Line of Defense possesses an updated risk register to reflect IT’s overall risk portfolio. Risk identification exercises are conducted bi-annually by the 1st Line of Defense. The IT risk register is developed and updated collaboratively with key business stakeholders. Risk events are brainstormed using high-level IT risk categories and refined using COBIT 5 IT processes.
Los Angeles
Rectangle 7.png

CONTACT US

LET'S WORK TOGETHER!

formimg.png

Send Us A Message

bottom of page