PROACTIVE RISK
  • About
    • Our Manifesto
    • Capability Statement
    • Agreements >
      • Mutual Confidentiality and Non Disclosure Agreement
      • Master Agreement | Work Order
    • Request Support
    • Gorilla
    • Contact Us
  • SOLUTIONS
    • Fractional CIO/CISO
    • Cyber Recruiter
    • Threat Modeling
    • Policies and Plans
    • MonitorIT®
    • Software Development
    • Domains | DNS
    • PhishIT®
    • MeasureRISK®
    • Vendor Risk
    • CATSCAN®
    • Physical Security
    • ProtectIT®
    • ManageIT®
    • FINDIT® >
      • RAPTOR eDiscovery
  • RESOURCES
    • Tech News
    • GRAY BEARD BLOG
    • Events - Meet-Up
    • Videos
    • Store
    • Guides | Tools

OUR MANIFESTO

  • We recognize that open-source and commercial software has become the foundation of our modern world. We know the awesome responsibility of providing services to our clients
  • We recognize that our work will be used in ways we cannot anticipate, in ways they were not designed, and for longer than ever intended.
  • We recognize that our work will be attacked by talented and persistent adversaries who threaten our clients physical, economic, and national security
  • We recognize these things, and we choose to be in this business helping our customers every day.​
  • We will be secure because our people refuse to be a source of vulnerability or weakness. We will be secure, not because it is easy, but because it is necessary and we are up for the challenge.

CORE VALUES

  • ​People - Everyone has a role to play in information security. Security is implemented and practiced by people. People design and implement processes and technology, as well as follow processes and use technology to enable business.
  • Process - Includes formal and informal mechanisms (large and small, simple and complex) to get things. Processes identify, measure, manage, and control risks to confidentiality, integrity, availability, privacy, and safety, and they also ensure accountability.​​
  • Technology - ​Is composed of all of the tools, applications and infrastructure that make processes more efficient. Technology implemented by people following processes allows for the organization to meet its information security objectives.
Our focus is to help Critical Infrastructure. 
  • financial services (banking, clearing);
  • security services (police, military)
  • electricity generation transmission and distribution;
  • gas production, transport, and distribution;
  • oil and oil products production, transport, and distribution;
  • telecommunications
  • water supply (drinking water, wastewater/sewage, stemming of surface water (e.g. dikes and sluices));
  • agriculture, food production, and distribution;
  • heating (e.g. natural gas, fuel oil, district heating);
  • public health (hospitals, ambulances);
  • transportation systems (fuel supply, railway network, airports, harbors, inland shipping);

Contact Info

Proactive Risk Inc.
Tel: +1 (973) 298-1160
Web: www.proactiverisk.com
eMail: sales(at)proactiverisk.com

CONTACT US
Picture
© COPYRIGHT 2023. ALL RIGHTS RESERVED.
  • About
    • Our Manifesto
    • Capability Statement
    • Agreements >
      • Mutual Confidentiality and Non Disclosure Agreement
      • Master Agreement | Work Order
    • Request Support
    • Gorilla
    • Contact Us
  • SOLUTIONS
    • Fractional CIO/CISO
    • Cyber Recruiter
    • Threat Modeling
    • Policies and Plans
    • MonitorIT®
    • Software Development
    • Domains | DNS
    • PhishIT®
    • MeasureRISK®
    • Vendor Risk
    • CATSCAN®
    • Physical Security
    • ProtectIT®
    • ManageIT®
    • FINDIT® >
      • RAPTOR eDiscovery
  • RESOURCES
    • Tech News
    • GRAY BEARD BLOG
    • Events - Meet-Up
    • Videos
    • Store
    • Guides | Tools