top of page

How We Serve You

At Secure Cyber Trust, we are committed to providing the highest and latest cybersecurity consulting and advising, along with aggregation services to businesses of all sizes.

 

We strive to ensure our clients have the most secure systems and are up to date with the latest technology regulatory compliance and industry standards. Our team of dedicated professionals is experienced in conducting a regulatory cybersecurity assessment to determine the vulnerability of the regulated party’s Information Technology (IT) and Operational Technology (OT) systems and develop remediation measures to close any identified gaps.

Our Services

Financial and Security Regulatory
  • FFIEC Compliance

  • FCAT Compliance

  • FED Line Attestation 

  • SWIFT Assessment

  • GLBA Assessment

  • Sabarnex-Oxley (SOX) Compliance

  • FINRA Compliance

Frameworks and Standards
  • ISO 27001 2022 is the international standard for information security management systems

  • ISO 22301:2019, Security and resilience – Business continuity management systems

  • NIST Special Publication 800-53 provides a catalog of security and privacy controls for all U.S. federal information systems. 

Security Monitoring
  • iSeries(AS/400) Security Assessments and Monitoring

  • User Access Review and Entitlement Review

Industry Specific
  • IC 22-05A

  • IACSSP 7.3.1.A 

TSA Virtual Cybersecurity Officer

The Transportation Security Administration (TSA) is issuing this Information Circular (IC 22-05A) due to the ongoing cybersecurity threat to transportation systems and associated infrastructure to prevent against the significant harm to the national and economic security of the United States (U.S.) that could result from the “degradation, destruction, or malfunction of systems that control this infrastructure".

TSA Logo

TSA recommends that these parties do the following:

  1. Conduct a cybersecurity assessment to determine the vulnerability of the regulated party’s Information Technology (IT) and Operational Technology (OT) systems and develop remediation measures to close any identified gaps.

  2. Develop a Cybersecurity Incident Response Plan to reduce the risk of operational disruption or significant business or functional degradation of necessary capacity, as defined in this IC, should the IT and/or OT systems of the regulated party be affected by a cybersecurity incident.

  3. Maintain any documentation and make it available to TSA upon request. TSA is issuing this IC to protect aviation security, in consultation with the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Aviation Administration

 

In addition, the TSA issued the IACSSP 7.3.1.A, that requires the "IAC to designate the IAC Cyber Security Coordinators (CSC), at the corporate level". PSI’s will follow the same designation procedure currently used for IAC Security coordinator (IACSC), company letterhead and proof of US citizenship, if the designee is not currently the IACSC for the IAC or IAC-CCSF.

 

 

Secure Cyber Trust, provides a service especially customized to your compliance requirements that respond to the IC 22-05A in every step.

We have the expertise and experience to conduct a cybersecurity assessment, identifying your vulnerabilities and more importantly to develop a remediation plan closing gap and mitigating risk exposure. 

 

We design and document a Cybersecurity Incident Response Plan according to your needs to reduce the risk of service interruption affecting services, production and reputation. 

We are there for you.

 

We are your IAC Cyber Security Coordinator (CSC), you can delegate Cybersecurity to us, because we can be there 24/7 and respond to cybersecurity incidents on your behalf with us you have a TSA Virtual Cybersecurity Officer. 

Contact Us Visual

Contact Us to Receive a Personalized
Defense for your Business

(786) 383-8383
LinkedIn logo
Secure Cyber Trust Company Logo
bottom of page