top of page

How We Serve You

At Secure Cyber Trust, we are committed to providing the highest and latest cybersecurity consulting and advising, along with aggregation services to businesses of all sizes.

 

We strive to ensure our clients have the most secure systems and are up to date with the latest technology regulatory compliance and industry standards. Our team of dedicated professionals is experienced in conducting a regulatory cybersecurity assessment to determine the vulnerability of the regulated party’s Information Technology (IT) and Operational Technology (OT) systems and develop remediation measures to close any identified gaps.

Our Services

Financial and Security Regulatory
  • FFIEC Compliance

  • FCAT Compliance

  • FED Line Attestation 

  • SWIFT Assessment

  • GLBA Assessment

  • Sabarnex-Oxley (SOX) Compliance

  • FINRA Compliance

Frameworks and Standards
  • ISO 27001 2022 is the international standard for information security management systems

  • ISO 22301:2019, Security and resilience – Business continuity management systems

  • NIST Special Publication 800-53 provides a catalog of security and privacy controls for all U.S. federal information systems. 

Security Monitoring
  • iSeries(AS/400) Security Assessments and Monitoring

  • User Access Review and Entitlement Review

Industry Specific
  • IC 22-05A

  • IACSSP 7.3.1.A 

TSA Virtual Cybersecurity Officer

The Transportation Security Administration (TSA) is issuing this Information Circular (IC 22-05A) due to the ongoing cybersecurity threat to transportation systems and associated infrastructure to prevent against the significant harm to the national and economic security of the United States (U.S.) that could result from the “degradation, destruction, or malfunction of systems that control this infrastructure".

TSA Logo

TSA recommends that these parties do the following:

  1. Conduct a cybersecurity assessment to determine the vulnerability of the regulated party’s Information Technology (IT) and Operational Technology (OT) systems and develop remediation measures to close any identified gaps.

  2. Develop a Cybersecurity Incident Response Plan to reduce the risk of operational disruption or significant business or functional degradation of necessary capacity, as defined in this IC, should the IT and/or OT systems of the regulated party be affected by a cybersecurity incident.

  3. Maintain any documentation and make it available to TSA upon request. TSA is issuing this IC to protect aviation security, in consultation with the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Aviation Administration

 

In addition, the TSA issued the IACSSP 7.3.1.A, that requires the "IAC to designate the IAC Cyber Security Coordinators (CSC), at the corporate level". PSI’s will follow the same designation procedure currently used for IAC Security coordinator (IACSC), company letterhead and proof of US citizenship, if the designee is not currently the IACSC for the IAC or IAC-CCSF.

 

 

Secure Cyber Trust, provides a service especially customized to your compliance requirements that respond to the IC 22-05A in every step.

We have the expertise and experience to conduct a cybersecurity assessment, identifying your vulnerabilities and more importantly to develop a remediation plan closing gap and mitigating risk exposure. 

 

We design and document a Cybersecurity Incident Response Plan according to your needs to reduce the risk of service interruption affecting services, production and reputation. 

We are there for you.

 

We are your IAC Cyber Security Coordinator (CSC), you can delegate Cybersecurity to us, because we can be there 24/7 and respond to cybersecurity incidents on your behalf with us you have a TSA Virtual Cybersecurity Officer

Change Advisory Board (CAB) Functions

At Secure Cyber Trust, we understand the importance of a strong Change Advisory Board (CAB) within the Change Management (CM). Change management is a discipline that focuses on managing changes within an organization. It involves implementing approaches to prepare and support individuals, teams, and leaders in making organizational change. The CAB plays a vital role in reviewing and approving proposed changes to your IT infrastructure and ensuring they align with your overall security posture.

 

Our team of experts can provide comprehensive CAB support, including:

Security Expertise: We bring in-depth knowledge of cybersecurity best practices to evaluate proposed changes for potential security risks.

Risk Assessment: We assess the impact of proposed changes on your security controls and overall risk profile.

Compliance Guidance: We ensure proposed changes adhere to relevant industry regulations and compliance standards.

Streamlined Process: We help you establish a clear and efficient CAB process, saving you time and resources.

Informed Decisions: We provide insightful analysis and recommendations to empower your CAB to make informed decisions regarding IT changes.

Benefits of Secure Cyber Trust's CAB Support:

Reduced Security Risks: Proactively identify and mitigate potential security vulnerabilities introduced by IT changes.

Improved Compliance: Ensure all IT changes adhere to relevant regulations and compliance requirements.

Enhanced Efficiency: Optimize your CAB process for smoother and faster decision-making on IT changes.

Peace of Mind: Gain confidence that your IT infrastructure remains secure with every change implemented.

 

By partnering with Secure Cyber Trust, you can be confident your CAB has the expertise and guidance needed to make informed decisions that prioritize both security and business needs.

Contact Us Visual

Contact Us to Receive a Personalized
Defense for your Business

(786) 383-8383
LinkedIn logo
Secure Cyber Trust Company Logo
bottom of page