PROACTIVERISK
  • ABOUT US
    • Agreements >
      • Mutual Non-Disclosure Agreement
      • Master Services Agreement
      • PENTESTON® Annual Agreement
      • PENTESTON® TOS
      • Privacy Policy
    • Help Wanted
    • Our Manifesto
    • Capability Statement
  • SOLUTIONS
    • Cyber Advisory
    • Augmentation
    • MeasureRISK® - Identify
    • CATSCAN® - Identify
    • PENTESTON® - Identify
    • MonitorIT® - Protect
    • Training - Protect
    • ManageIT® - Defend >
      • Health Check
    • FINDIT® - Respond
  • RESOURCES
    • Videos
    • Projects
    • Blog
    • News

Cyber Training

Cyber training - Protect

In the military we say "Train like your fight.. fight like you train" as a way of life. In the cyber realm we believe that we need to teach basic cyber best practices to all members of the team to establish a basic understanding and the provide targeted making your staff a harder target.

We have been very successful in establishing annual security awareness programs that are reviewed quarterly blending education, awareness, testing and quarterly reporting.

Speak to a member of the team and let us show you the difference of how a managed program can help your business improve its resiliency and comply with your supply chain requirements

CONTROL VALIDATION

Do you think you have controls in place to stop a targeted attack(s)? TEST your effectiveness of your training and policies with a controlled and targeted CATSCAN® assessment
  • Will your current deployed technology solution stop our advanced techniques?  ​
  • Will your employees be able to identify the ruse and avoid becoming the next victim?
For more details about our methods and tactics see Red Team Assessments 

DOCUMENTATION

​ProactiveRISK can assist with customized policy development that is acceptable to your legal council including
  • Acceptable Use Policy
    • ​Defines acceptable use of equipment and computing services, and the appropriate employee security measures to protect the organization's corporate resources and proprietary information.
  • Employee Internet Use Monitoring and Filtering Policy
    • Defines the standards for systems that monitor and limit web use from any host within the company's network.
  • ​Pandemic Policy Development
    • Defines the requirements for planning, preparation and performing exercises for pandemic disease outbreak over and above the normal business continuity and disaster recovery planning process.
  • Data Breach Response Policy
    • Defines the goals and the vision for the breach response process. This policy defines to whom it applies and under what circumstances, and it will include the definition of a breach, staff roles and responsibilities, standards and metrics (e.g., to enable prioritization of the incidents), as well as reporting, remediation, and feedback mechanisms.

We can assist with a wide array of policy documentation and deliver the education to your staff virtually or in person as to why they should care and how the guideline will help them personally.

Contact Info

Proactive Risk Inc.
759 Bloomfield Ave #172
West Caldwell, NJ 07006
Tel: 1-888-255-0834 
Fax: 1-973-298-1160
Web: www.proactiverisk.com
eMail: sales(at)proactiverisk.com

Social

Contact Us
© COPYRIGHT 2021. ALL RIGHTS RESERVED.  --  POLICIES & AGREEMENTS 
  • ABOUT US
    • Agreements >
      • Mutual Non-Disclosure Agreement
      • Master Services Agreement
      • PENTESTON® Annual Agreement
      • PENTESTON® TOS
      • Privacy Policy
    • Help Wanted
    • Our Manifesto
    • Capability Statement
  • SOLUTIONS
    • Cyber Advisory
    • Augmentation
    • MeasureRISK® - Identify
    • CATSCAN® - Identify
    • PENTESTON® - Identify
    • MonitorIT® - Protect
    • Training - Protect
    • ManageIT® - Defend >
      • Health Check
    • FINDIT® - Respond
  • RESOURCES
    • Videos
    • Projects
    • Blog
    • News