Lazarus Alliance

Chandler, United States

5

1 review

Accepts Credit Cards

Map

Streetview

Activate map

Bussiness info

Accepts Credit Cards
Yes
Accepts Bitcoin
No

Description

Specialties

IT Audit

IT Compliance (PCI, SSAE 16, HIPAA, ISO 27 001, FedRAMP, SOX)

IT Risk Management

Cyber Security

IT Security Assessment

IT Security Policy

Vulnerability Testing

Penetration Testing

History

Established in 2000.

Lazarus Alliance’s primary purpose is to help organizations attain, maintain, and demonstrate compliance and information security excellence, in any jurisdiction. Lazarus Alliance specializes in IT security, risk, privacy, governance, cyberspace law and compliance leadership solutions and is fully dedicated to global success in these disciplines. Contact us and learn more about Lazarus Alliance and why Lazarus Alliance is Proactive Cyber Security™!

Lazarus Alliance is a proud veteran owned business.

Helping companies eliminate nearly 96% of all cyber security risks, it’s no wonder that Lazarus Alliance has become a leading international name synonymous with incorruptible leadership, meaningful services, exceptional customer support and tangible innovations all specifically to prevent negative press and damage to your company, shareholders, employees and customers.

Learn more about why Lazarus Alliance is Proactive Cyber Security™!

Meet the Business Owner

Michael P.

Business Owner

Michael Peters is the CEO of Lazarus Alliance, Inc. and has served as an independent information security consultant, executive, researcher and author. He is an internationally recognized and awarded security expert with years of IT and business leadership experience and many previous executive leadership positions.

From a credential perspective, Michael holds an Executive Juris Doctor in Cyberspace Law; a certified MBA in IT Management, undergraduate degree in IT Security, CISSP, QSA, CRISC, CISM, SCPA, CCE, CMBA, SCSA and he is an ISSA Hall of Fame recipient.

Peters is the serial entrepreneur and innovator behind the IT Audit Machines™, the Policy Machine™, Cybervisor™, «Your Personal CXO™» information security network, the Security Trifecta™ philosophy, Survival Guidance series of audit protocols, and the globally-​popular Holistic Operational Readiness Security Evaluation (HORSE) Project™.