• Training

    Let us share our expertise with you.  Through online or in person training we can give your employees the skills they need to keep your information secure and to adhere to compliance regulations.

  • Online

    Technology is complex to begin with; and it is always changing.  New products and services are brought to market that can help Clients to better serve their customers.  It is difficult for people who are not security or IT experts to know exactly what is offered and what the risk may be to the bank.  SecurIT360 is an independent firm focused on Cyber Security.  Our driving force is knowledge and we have a structured research program; we consume a daily diet of knowledge and take it to our clients.  SecurIT360 has trained thousands of users to stay safe and secure.

    We can offer online training customized to fit your organizations needs to meet regulations, including tracking statistics and recording viewing logs for each video.

  • In Person

    We can also train in person your staff on-site and in person.  Training topics can be customized to fit your organization’s needs, and can range from general IT security topics to specific training on industry standards and regulations.  A few of the topics that we offer are mentioned below:

Basic Topics:

  • Computing Basics – Layman’s terms
  • Secure Passwords
  • Networking Technologies
  • Virtualization
  • Cloud vs. Hosted
  • Email/Spam/Phishing
  • Regulatory Standards
  • Internet/Intranet access and use
  • Vulnerability Management
  • Penetration Testing
  • Portable Data storage
  • Web Service Considerations
  • Change control
  • Access Control
  • Remote Access

 

 

Advanced Topics:

  • Enterprise Security
  • Vendor Security program Evaluation
  • Evaluating third-party Audit reports and certifications
  • Breach detection and Notification
  • Proactive Monitoring – IPS, IDS, SIEM
  • Software development considerations
  • Multi Factor Authentication
  • Network security
  • Databases
  • HR considerations
  • Physical access
  • Security incident and privacy event management
  • Secure disposal
  • Encryption
  • Custom topics to fit your organization’s needs