Directory

Denis Calderone

J.S. Held Releases Insights on Risks & Opportunities Expected to Impact Organizations in 2025

Read More close Created with Sketch.

Denis Calderone joined J.S. Held in October 2022 following J.S. Held's acquisition of TBG Security. Denis has worked in the information technology field for more than 20 years with the last 18 being completely dedicated to information security. He holds multiple security certifications and prides himself on viewing information security in a holistic light.

Denis’ key technical expertise is in network and application penetration testing, but mostly plays a CISO/CSO on-demand role these days for numerous consulting customers. He does not believe that the security challenges businesses face today can simply be met by installing point solutions or checking off regulatory audit check sheets. Each client faces unique problems and threats. An understanding of the industry threat profile, corporate culture, and risk tolerance must always be considered when addressing corporate security needs.

As a partner, Denis led the technical consulting arm of TBG Security and performed the role of CSO. Prior to TBG Security, Denis worked for Exodus Communications as part of their Northeast Security Practice, and for Lycos as their information security engineer.

Denis was a contributor to J.S. Held's 2025 Global Risk Report, which can be viewed here.

Key Expertise

  • Red Team Penetration Testing
  • Black Box Testing
  • White Box Testing
  • Purple Teaming
  • Network Penetration Testing
  • Application Penetration Testing
  • Physical Penetration Testing
  • Social Engineering
  • Cyber Security Compliance Frameworks
  • Cyber Security Program Development
  • Security Policy Development
  • Security Procedural Workflow Development
  • Infosec Mentorship
  • Infosec Training
  • Conducting Table-Top Cyber Simulations

Insights by Denis Calderone

Click to learn more
How to Defend Against Identity Theft This Tax Season
Cybercriminals increase their attacks during tax season. This article outlines steps taxpayers can take to protect their identity and data.
PDFDownload PDF