Harris has a long-spanning career across the private sector in various industries that has helped him improve a company’s security maturity, implement a specific strategy, or build a security program from the ground floor. Harris also has experience across security, diving into the realms of corporate, information, and cyber security. As we enter 2025, the industry is also seeing a change in the way security advisors assist a client; this has transformed into fractional security advising, with the ability to represent from an executive point of view and assist the client with a variety of needs, which include:

Compliance ReadinessMany small and medium-sized companies are doing business with large global customers that demand appropriate compliance is in place and managed continuously. As a fractional advisor, I help clients prepare for compliance by identifying appropriate controls, risk assessments, development of policies, and other processes, educating employees on their roles required for gathering and testing their own controls and aligning with the audit portion of the process.
Third-Party RiskThis has been a moving target for some time, ever since the large data breaches in 2012 exposed the risk of third parties, some of whom were not taking security and privacy seriously, causing data breaches for their clients. I can assist a company with developing the right strategies, processes, templates, vendor risk registers, vendor questionnaires, etc.
Cyber ResilienceContinues to be an integral part of the security ecosystem, maintaining processes to prepare, detect, respond, contain, and restore following an incident. Companies need the proper Incident Response plans, playbooks, readiness assessments, business continuity, and disaster recovery plans. In addition, constant testing of the plans is necessary for both technical and executive teams so they understand their roles and responsibilities during a major incident.
vCISO/vCSOSome companies, especially small and medium ones, are finding that they need security leadership, whether to maintain compliance or for other reasons. Hiring the best and most experienced CISO or CSO can take time, or perhaps your CISO/CSO recently left the organization, and you need to maintain the status quo with security and compliance. This is where a virtual security officer comes into play. The virtual security officer can assist with security roadmaps, aligning security needs with business needs, ongoing compliance activities, security awareness, working with third parties like MSP/MSSPs, etc.
Data Protection and Privacy Data has always been the “crown jewel” that attackers have been after through their often coordinated actions, whether outsider or insider. Companies, in general, should have protected data, especially data belonging to consumers, employees, and customers that are deemed sensitive or protected. The hardest part is knowing what data resides at a company, and through various assessments and activities like data processing agreements, minimum data security requirements, various privacy laws and regulations, data mapping exercises, etc., I can assist a company in ensuring their data is protected properly. This can also include rolling out data protection training, Privacy Champions programs, and other initiatives.
Threat Intelligence and Threat ProfileUnderstanding your company’s threats and where they originate will help you develop an overall strategy for protecting the company, its assets, and its employees. I can assist a company or individual (UHNW, VIP) with specific profiling of attackers, physical or cyber-related. This can include deep-dive due diligence on a potential customer or partnership or competitive intelligence reports for a new program or product launch.