Other Desired Qualifications

  • Positive outlook on life.

  • MUST have a sense of humor.

  • Looking to make a difference in the world.

  • Enjoy a challenging work environment with great opportunities for professional growth.

  • Be willing and able to assist with a variety of other duties that may arise.

Quick maturity assessment

The only cybersecurity self-test you will ever need to take!

Our CISO and CIO executives are among the best in the business. They have built, secured, and managed some of the largest technology systems in the world. With their combined experience, they have distilled the core fundamentals of security into 4 categories intuitively capturing key benchmarks of security frameworks without the burden or cost of full-blown NIST800 or CMMC assessments. This self-test gives you valuable information in a fraction of the time to determine whether your environment has achieved a base level of security.

Based upon the survey responses received you've scored at a satisfactory level for Cyber Security Training.

Email Phishing tests are performed at least once every six months. Annual CyberSecurity Web Training is conducted with all users and all new hires go through training against your company's CyberSecurity Policies.An established channel has been published to all users to report Cybersecurity threats.

The questionnaire provided is for basic security functions. We recommend a consultation with one of our security professionals to further evaluate other areas within Cybersecurity Training that are at a more advanced level.

Real world examples

Accounting manager receives an email from the "CEO" to change banking information for a major vendor. The accounting manager quickly makes the change in the email. The vendor payments go through at the end of the month. The true vendor calls in question the lack of payments past due for over 60 days. After review it was determined the accounting manager fell for a Phishing attack.

An employee was called by an "IT Helpdesk" personell to request assistance with a MFA test. The employee provided the MFA credentials allowing the attacker to gain access to the ERP system enablding them to issue payments to the attacker's account that was setup.

Here is why Cybersecurity Training is important.

Cybersecurity Training is poor security habiits from personell are the most common security breach to occur. Actively training your end users through IT Awareness training and testing the end users with Phising Tests helps to raise awareness of the most common security faults that are taken advantage of.

Yes you are mature, here's why

Based upon the survey responses received you've scored at a level in which there are open risks within for Cybersecurity Visibility.

All of the following practices are strongly recommended as laying the foundation of your IT Security best practices for this area:

  • Monitoring and issue alerts for Unauthorized Logins are accomplished.

  • 3rd party penetration testing "Pen Test" is conducted at least once a year along

  • Implementation of a Security Event and Incident Management (SEIM) or 24/7 Alerting system for all your servers, workstations and firewalls collecting and reporting logging information

  • Implementation of Next Generation Firewall (NGFW) that support intruder protect / intruder detection.


A consultation with a 3GC IT security professional is recommended to review and discuss your survey results.

Your Cybersecurity Visibility can use some work, and here's what you should do.

Here is why Cybersecurity Visibility is important.

Cybersecurity Visibility is important as this area treats IT Security in a proactive manner. The risks of an IT Security breach warrant a proactive stance of actively monitoring and thwarting any vulnerabilities. The loss of customer goodwill due to a security breach can have longstanding effects to the trust of an established clientbase and can be compounded if basic monitoring and alerting is not enabled as a best practice and a matter of due deligence of protecting customer data.

Real world examples

Target Breach: A 3rd party vendor HVAC system was all networked. In order for the HVAC provider to support the systems remotel provided VPN access. A hacker gained control of the vendor's computer and was able to navigate the internal network and find a system to breach and escalate privilages. This continued until the hackers located a database in which credit card data was stored. 200MM credit cards were comprosed as a result. There was no visibility to the logins and accessing of the systems from the elevated permissions that were self awarded by the hackers. The breach was unknown for months potentially years to allow hackers the time to break into other internal systems. Visibility of access of remote devices may have prevented the extent in which the hackers were able to navigate the network as the breach could have been identified before key systems were hacked.

Sony: The data exfiltration over a petabyte of data left the company. There was no visibility to this breach; in which Cybersecurity Visibiltiy were implemented could have minimized the impact or halted the loss of customer information.

Based upon the survey responses received you've scored at a level in which there are open security risks for Cyber Security Training.

All of the following practices are strongly recommended as laying the foundation of your IT Security best practices for this area:

  • Email Phishing tests are performed at least once every six months.

  • Annual CyberSecurity Web Training is conducted with all users

  • All new hires go through training against your company's CyberSecurity Policies.

  • A reporting channel is established for all users to report Cybersecurity threats.


A consultation with a 3GC IT security professional is recommended to review and discuss your survey results.

Your Cybersecurity Training can use some work, and here's what you should do.

Here is why Cybersecurity Training is important.

Cybersecurity Training is poor security habiits from personell are the most common security breach to occur. Actively training your end users through IT Awareness training and testing the end users with Phising Tests helps to raise awareness of the most common security faults that are taken advantage of.

Real world examples

Accounting manager receives an email from the "CEO" to change banking information for a major vendor. The accounting manager quickly makes the change in the email. The vendor payments go through at the end of the month. The true vendor calls in question the lack of payments past due for over 60 days. After review it was determined the accounting manager fell for a Phishing attack.

An employee was called by an "IT Helpdesk" personell to request assistance with a MFA test. The employee provided the MFA credentials allowing the attacker to gain access to the ERP system enablding them to issue payments to the attacker's account that was setup.

Based upon the survey responses received you've scored at a satisfactory level for Cybersecurity Visibility.

Monitoring and issue alerts for Unauthorized Logins are accomplished. 3rd party penetration testing "Pen Test" is conducted at least once a year along with the implementation of a SEIM or 24/7 Alerting system. All your servers, workstations and firewalls collecting and reporting logging information and you are running NGFW that support intruder protect / intruder detection.

The questionnaire provided is for basic security functions. We recommend a consultation with one of our security professionals to further evaluate other areas within Cybersecurity Visibility that are at a more advanced level.

Yes you are mature, here's why

Here is why Cybersecurity Visibility is important.

Cybersecurity Visibility is important as this area treats IT Security in a proactive manner. The risks of an IT Security breach warrant a proactive stance of actively monitoring and thwarting any vulnerabilities. The loss of customer goodwill due to a security breach can have longstanding effects to the trust of an established clientbase and can be compounded if basic monitoring and alerting is not enabled as a best practice and a matter of due deligence of protecting customer data.

Real world examples

Target Breach: A 3rd party vendor HVAC system was all networked. In order for the HVAC provider to support the systems remotel provided VPN access. A hacker gained control of the vendor's computer and was able to navigate the internal network and find a system to breach and escalate privilages. This continued until the hackers located a database in which credit card data was stored. 200MM credit cards were comprosed as a result. There was no visibility to the logins and accessing of the systems from the elevated permissions that were self awarded by the hackers. The breach was unknown for months potentially years to allow hackers the time to break into other internal systems. Visibility of access of remote devices may have prevented the extent in which the hackers were able to navigate the network as the breach could have been identified before key systems were hacked.

Sony: The data exfiltration over a petabyte of data left the company. There was no visibility to this breach; in which Cybersecurity Visibiltiy were implemented could have minimized the impact or halted the loss of customer information.

Identity Management

Asset Management

Cybersecurity Visibility

Cybersecurity

Training

Based upon the survey responses received you've scored at a satisfactory level for Asset Management.

NexGen Endpoint security is in place and automatically updated. A formal policy is established for handling and securing Bring Your Own Devices (BYOD). Asset tracking is accomplished through a database to establish a full listing of authorized devices within your IT environment. Furthermore, change control management of assets along with a standard desktop PC image has been created to ensure consistency of PC and software that is installed on them. Patching and change management across assets is established providing a comprehensive view of authorized devices and changes within them to identify potential security breaches (ref. Cybersecurity Visibility). An IT Security professional are involved with the onboarding of any 3rd party systems or software into the IT environment for logging of devices and software to asset tracking

The questionnaire provided is for basic security functions. We recommend a consultation with one of our security professionals to further evaluate other areas within Identity Management that are at a more advanced level and to account for future growth needs.

Yes you are mature, here's why

Here is why Asset Management is important.

Asset Management is important as a firm understanding must also be obtained of the authorized devices within your IT environment. The devices identified would make up the assets that hardened against the most recent security threats through actively patching and deploying current security software. Without a listing of assets to be secured, cost planning and forecasting to obtain necessary funding to close security gaps cannot be measured.

Real world examples

Unpatched assets that provided the attacker a means to exploitt a vulnerability. that otherwise had been secured via patching.

A senior entertainment executive brought in a home laptop that had malware installed on it already. The malware was a keylogger which began to capture account credentials compromising company data.

Point of sale (POS) systems that were windows based were not current on patching became compromised as these devices were unknown to the operator that they ran on Windows OS. The company didn't realize that the end points needed to be patched in effect. This left a security vulnerability that allowed for a ransomware attack (when an attacker makes a victim's data unreadable in an encrypted format until a ransom is paid to restore it).

Based upon the survey responses received you've scored at a level in which there are open risks within Identity Management.

All of the following practices are strongly recommended as laying the foundation of your IT Security best practices for this area:

  • User Onboarding and Offboarding procedures are formalized establishing who are the authorized users of your systems enabling audits of system access logins.

  • MFA and SSO are both fully deployed as additional layers of security.


A consultation with a 3GC IT security professional is recommended to review and discuss your survey results.

Your Identity Management can use some work, and here's what you should do.

Here is why Identity Management is important.

Identity Management is important as a firm understanding must be obtained of the authorized users within your IT environment. Without a source of truth of who your authorized users are there is no ability to gauge if a system login is authorized or a security breach.

Security technologies such as Multi-Factor Authentication (MFA) and Single Sign-On (SSO) help to mitigate the risk of unathorized users of gaining access to authorized user accounts within the environment.

Real world examples

Terminated user still had access to a system was able to create fradulent transactions.

CEO that had super-admin previlages and refused to utilize MFA. His account was comprismied through a phising attack.

An IT personell was offboarded improperly and stole critical information from the company in which he sold to the highest bidder on the black market.

Based upon the survey responses received you've scored at a satisfactory level for Identity Management.

User Onboarding and Offboarding procedures exist establishing who are the authorized users of your systems enabling audits of system access logins. MFA and SSO are both fully deployed as additional layers of security.

The questionnaire provided is for basic security functions. We recommend a consultation with one of our security professionals to further evaluate other areas within Identity Management that are at a more advanced level and to account for future growth needs.

Yes you are mature, here's why

Here is why Identity Management is important.

Identity Management is important as a firm understanding must be obtained of the authorized users within your IT environment. Without a source of truth of who your authorized users are there is no ability to gauge if a system login is authorized or a security breach.

Security technologies such as Multi-Factor Authentication (MFA) and Single Sign-On (SSO) help to mitigate the risk of unathorized users of gaining access to authorized user accounts within the environment.

Real world examples

Terminated user still had access to a system was able to create fradulent transactions.

CEO that had super-admin previlages and refused to utilize MFA. His account was comprismied through a phising attack.

An IT personell was offboarded improperly and stole critical information from the company in which he sold to the highest bidder on the black market.

Based upon the survey responses received you've scored at a level in which there are open risks within Asset Management.

All of the following practices are strongly recommended as laying the foundation of your IT Security best practices for this area:

  • NexGen Endpoint security is in place and automatically updated.

  • A formal policy is established for handling and securing Bring Your Own Devices (BYOD) .

  • Asset tracking is accomplished through a database to establish a full listing of authorized devices within your IT environment.

  • Change control management is implemented

  • A Standard desktop PC image is utilized for PC deployments

  • Standard patching and maintenance schedule is established

  • IT Security personnel are involved with the onboarding of any 3rd party systems or software into the IT environment for logging of devices and software to asset tracking


A consultation with a 3GC IT security professional is recommended to review and discuss your survey results.

Your Asset Management can use some work, and here's what you should do.

Here is why Asset Management is important.

Asset Management is important as a firm understanding must also be obtained of the authorized devices within your IT environment. The devices identified would make up the assets that hardened against the most recent security threats through actively patching and deploying current security software. Without a listing of assets to be secured, cost planning and forecasting to obtain necessary funding to close security gaps cannot be measured.

Real world examples

Unpatched assets that provided the attacker a means to exploitt a vulnerability. that otherwise had been secured via patching.

A senior entertainment executive brought in a home laptop that had malware installed on it already. The malware was a keylogger which began to capture account credentials compromising company data.

Point of sale (POS) systems that were windows based were not current on patching became compromised as these devices were unknown to the operator that they ran on Windows OS. The company didn't realize that the end points needed to be patched in effect. This left a security vulnerability that allowed for a ransomware attack (when an attacker makes a victim's data unreadable in an encrypted format until a ransom is paid to restore it).

As you can imagine, the above is a quick snapshot measured against industry standards based on the answers you provided. However, we can have one of our business analysts review the information you already provided and prepare a more comprehensive overview. To receive the pdf report fill out the contact information below.

Thanks for Submitting!

Are your User Offboarding Policies written and distributed to a) Service Desk/IT Admin and b)HR?
Do all of your system logins use a single sign on (SSO) provider?
Do you use Multi-factor Authentication (MFA) for all system logins?

Identity

Management

Asset

Management

Cybersecurity

Visibility

Cybersecurity

Training

Is there a written process for auditing the User and Service Accounts on a scheduled basis?
Are all Workstations and Servers (Physical and Virtual) running a NextGen EndPoint Protection system?
Are NextGen Endpoint Protection Agents updated automatically?
Do you have a BYOD management system?
Do you use an Asset Management System to track all IT Hardware (Workstations, Servers, etc)?
Do you use a master image when deploying new workstations?
Do you have an Out of Band Patch Management for all Workstations and Servers?
Do you have a written change management procedures?
Are new systems or software reviewed by an IT Security Professional to ensure all assets are logged to an Asset Database
Do you monitor and issue alerts for Unauthorized Logins on all systems?
Do you have a 3rd Party perform a system "Pen Test" at least once per year?
Do have you a SEIM or 24/7 Alerting system?
Are all your servers, workstations and firewalls collecting and reporting logging information?
Are your running NGFW that supports intruder protection / intruder detection?
Do you perform Email Phishing Tests at least once every six months?
Do you have Annual CyberSecurity Web Training for you users?
Are New Hires Required to go through Training for your company's CyberSecurity Policies?
Do you have a process for users to report email Phishing issues?
Are your User Onboarding Policies written and distributed to a) Service Desk/IT Admin and b)HR?

Thanks for submitting!