Contact Us

Ready to get started or have a question about how we can help? Please fill out our contact form and we will be in contact with you within 1 business day.

Prefer the phone? Give us a ring at +1.833.828.2732

37 N. Orange Ave
Orlando, FL 32806


Thought leadership in information security

Gourav Mukherjee

Managing Partner of Immersion Security, Gourav Mukherjee is a senior-level information technology executive and cyber security expert with over 20 years of success in the industry. As a thought leader in information security architecture, Gourav is a visionary in improving operations and compliance using a GRC framework to establish corporate controls and supporting processes. Gourav's vision for the standardization and implementation of IT strategies assists C-level executives in accomplishing their business objectives.

Book Gourav for a speaking engagement

Recent Engagements

Dec 4, 2019


Tampa, FL

Oct 18, 2019

Culture of Compliance


Oct 24, 2019

Florida Cyber Conference

Tampa Convention Center

Oct 28, 2019

ISC(2) Security Congress

Orlando, FL

Cyber Security

As a Chief Information Security Officer for over 20 years, Gourav is an expert in information technology risk and security assessment, and an advocate for strong cyber security practices including identification of control weaknesses, development of remediation plans and how to lead mitigation efforts.

Privacy Law

As a CISSP, CISA, CRISC, PCIP, and practicing attorney, Gourav's insight into privacy law, and his experience in supply chain contract negotiation, is a valuable resource for corporate legal leadership.

Risk Management

Analyze the business impacts of risk in your environment and learn how to develop business continuity plans to mitigate the effects of risk. Though leader in applying a risk based approach to cyber security practices.

Security Policy

Develop sensible policies that align with regulatory obligations and security objectives. Master the practical applications of security policy, how to mitigate the outcomes of security policy failures, and understand the legal implications of having incorrect security policies.