
Projects and Technologies
Secure Cyber Trust covers many technology operating systems, databases, hosted and cloud infrastructure platforms such as AWS and Azure , and legacy systems such as iSeries, (AS400), Z OS, Oracle, DB2, and CICS
Our Services
Financial and Security Regulatory
-
FFIEC Compliance
-
FCAT Compliance
-
FED Line Attestation
-
SWIFT Assessment
-
GLBA Assessment
-
Sabarnex-Oxley (SOX) Compliance
Frameworks and Standards
-
ISO 27001 2022 is the international standard for information security management systems
-
ISO 22301:2019, Security and resilience – Business continuity management systems
-
NIST Special Publication 800-53 provides a catalog of security and privacy controls for all U.S. federal information systems.
Security Monitoring
-
iSeries(AS/400) Security Assessments and Monitoring
-
User Access Review and Entitlement Review
Industry Specific
-
IC 22-05A
-
IACSSP 7.3.1.A
TSA Virtual Cybersecurity Officer
The Transportation Security Administration (TSA) is issuing this Information Circular (IC 22-05A) due to the ongoing cybersecurity threat to transportation systems and associated infrastructure to prevent against the significant harm to the national and economic security of the United States (U.S.) that could result from the “degradation, destruction, or malfunction of systems that control this infrastructure".

TSA recommends that these parties do the following:
-
Conduct a cybersecurity assessment to determine the vulnerability of the regulated party’s Information Technology (IT) and Operational Technology (OT) systems and develop remediation measures to close any identified gaps.
-
Develop a Cybersecurity Incident Response Plan to reduce the risk of operational disruption or significant business or functional degradation of necessary capacity, as defined in this IC, should the IT and/or OT systems of the regulated party be affected by a cybersecurity incident.
-
Maintain any documentation and make it available to TSA upon request. TSA is issuing this IC to protect aviation security, in consultation with the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Aviation Administration
In addition, the TSA issued the IACSSP 7.3.1.A, that requires the "IAC to designate the IAC Cyber Security Coordinators (CSC), at the corporate level". PSI’s will follow the same designation procedure currently used for IAC Security coordinator (IACSC), company letterhead and proof of US citizenship, if the designee is not currently the IACSC for the IAC or IAC-CCSF.
Secure Cyber Trust, provides a service especially customized to your compliance requirements that respond to the IC 22-05A in every step.
We have the expertise and experience to conduct a cybersecurity assessment, identifying your vulnerabilities and more importantly to develop a remediation plan closing gap and mitigating risk exposure.
We design and document a Cybersecurity Incident Response Plan according to your needs to reduce the risk of service interruption affecting services, production and reputation.
We are there for you.
We are your IAC Cyber Security Coordinator (CSC), you can delegate Cybersecurity to us, because we can be there 24/7 and respond to cybersecurity incidents on your behalf with us you have a TSA Virtual Cybersecurity Officer.

Contacts Us to Receive a Personalized
Defense for your Business
(786) 383-8383
