{"id":3532,"date":"2025-12-02T01:02:38","date_gmt":"2025-12-02T06:02:38","guid":{"rendered":"https:\/\/it-prosolution.com\/?page_id=3532"},"modified":"2025-12-02T01:57:54","modified_gmt":"2025-12-02T06:57:54","slug":"glba-compliance","status":"publish","type":"page","link":"https:\/\/it-prosolution.com\/trust-center\/compliance-and-regulation\/glba-compliance\/","title":{"rendered":"GLBA Compliance"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3532\" class=\"elementor elementor-3532\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-faa023b elementor-reverse-mobile elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"faa023b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2e3c457\" data-id=\"2e3c457\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c56587 elementor-widget elementor-widget-aux_modern_heading\" data-id=\"8c56587\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><h1 class=\"aux-modern-heading-primary\"><\/h1><h3 class=\"aux-modern-heading-secondary\"><span class=\"aux-head-before\">What Is <\/span><span class=\"aux-head-highlight\">GLBA Compliance?<\/span><\/h3><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1060fc elementor-widget elementor-widget-text-editor\" data-id=\"a1060fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The Gramm-Leach-Bliley Act (GLBA) is an act from congress that was put in place in 1999 to repeal the Glass Steagal Act of 1933. GLBA is also referred to as the Financial Services Modernization Act of 1999. While GLBA has many stipulations, there are two primary areas when it comes to Information Security requirements. This includes the Privacy Rule and the Safeguards Rule.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03ecc92 elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"03ecc92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/it-prosolution.com\/booking\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk with Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5a12ea9\" data-id=\"5a12ea9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1034bf2 elementor-widget elementor-widget-image\" data-id=\"1034bf2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"345\" height=\"328\" src=\"https:\/\/it-prosolution.com\/trust-center\/wp-content\/uploads\/sites\/19\/2024\/07\/GLBA.jpg\" class=\"attachment-full size-full wp-image-4585\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a0a8029 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"a0a8029\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3109be1\" data-id=\"3109be1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b0e4bc4 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"b0e4bc4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3dd3fb7\" data-id=\"3dd3fb7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-db3da4a elementor-widget elementor-widget-icon-box\" data-id=\"db3da4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"#\" >\n\t\t\t\t\t\t\tDo I Need To Comply With GLBA?\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t   The FTC Safeguards Rule applies to many organizations that receive non public information (NPI). A few examples are listed below: <br><br><ul>\n        <li>Banking Financial Institutions<\/li>\n        <li>Insurance Companies<\/li>\n        <li>A retailer that issues its own credit cards<\/li>\n        <li>An automobile dealership that leases automobiles<\/li>\n        <li>A personal property or real estate appraiser<\/li>\n        <li>In some cases, financial professionals<\/li>\n        <li>A business that prints or sells checks<\/li>\n        <li>Any business that wires money to and from customers<\/li>\n        <li>Any check cashing business<\/li>\n        <li>Accountants and tax preparation service companies<\/li>\n        <li>Travel agencies<\/li>\n        <li>Real estate settlement services<\/li>\n        <li>Mortgage Brokers<\/li>\n        <li>An investment advisory company or credit counseling service<\/li>\n        <li>Companies that bring buyers and sellers together<\/li>\n        <li>Higher Education institutions that receive federal student aid under Title IV of the Higher Education Act of 1965.<\/li>\n    <\/ul>\n<br>\n<br>\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-281b219\" data-id=\"281b219\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ab64dab elementor-widget elementor-widget-icon-box\" data-id=\"ab64dab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"#\" >\n\t\t\t\t\t\t\tWhat Can Happen If You Don't Comply With GLBA?\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tReplicate hacking techniques and exploits, such as unauthorized access and software exploitation, to identify your most vulnerable assets.\n<br>\n<br>\n\nThere are a number of enforcement bodies within the United States. The FTC and federal banking agencies are the most common enforcement agencies. The other enforcement agencies can be the State Attorney General, the State Insurance Commissioners, or the Consumer Financial Protection Bureau. The Office of the Comptroller of the Currency and the Securities Exchange Commission are also enforcement bodies. \n\nThe enforcement bodies may issue large fines. They may also issue consent orders that require security controls. The Consumer Financial Protection Bureau (CFPB) provides the latest enforcement actions on their website:\n\n<br>\n<br>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-77a60a2 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"77a60a2\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f48428c\" data-id=\"f48428c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1f08169 elementor-widget elementor-widget-aux_modern_heading\" data-id=\"1f08169\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><h2 class=\"aux-modern-heading-primary\"><\/h2><h3 class=\"aux-modern-heading-secondary\"><span class=\"aux-head-before\">IPS Strengths<\/span><span class=\"aux-head-highlight\"> At A Glance<\/span><\/h3><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f52bea elementor-widget elementor-widget-text-editor\" data-id=\"4f52bea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Cyber Security Services (CSS) assists financial institutions, banks, credit unions, lending companies, higher education, and government organizations. We understand the requirements of GLBA compliance better than most due to the many hats that we wear. Here is how we help companies maintain GLBA compliance:<\/p><ul><li>GLBA Risk Assessments<\/li><li>GLBA Gap Assessments<\/li><li>Virtual CISO and Risk Services<\/li><li>GLBA Policy Review<\/li><li>Security Awareness Training<\/li><li>Vendor Risk Assessments<\/li><li>Penetration Testing<\/li><li>Vulnerability Assessments<\/li><li>Encryption Solutions<\/li><li>Information Security Strategic Plans<\/li><li>Inventory of Assets<\/li><li>GLBA Data Classification Services<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-378005f elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"378005f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2c60180\" data-id=\"2c60180\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7ffb80c elementor-widget elementor-widget-aux_modern_heading\" data-id=\"7ffb80c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><h2 class=\"aux-modern-heading-primary\"><\/h2><h3 class=\"aux-modern-heading-secondary\"><span class=\"aux-head-before\">Our External Penetration Testing<\/span><span class=\"aux-head-highlight\">Process<\/span><\/h3><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-102fe88 aux-appear-watch-animation aux-fade-in-right elementor-widget elementor-widget-text-editor\" data-id=\"102fe88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"aux-bus2-title-divider\">\u00a0<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5cb03b elementor-widget elementor-widget-text-editor\" data-id=\"b5cb03b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tCyber Security Services (CSS) assists financial institutions, banks, credit unions, lending companies, higher education, and government organizations. We understand the requirements of GLBA compliance better than most due to the many hats that we wear. Here is how we help companies maintain GLBA compliance:\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-38c6e4b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"38c6e4b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-65e6cd0\" data-id=\"65e6cd0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a08763 elementor-widget elementor-widget-icon-box\" data-id=\"7a08763\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tThreat Protection And Response\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tWe understand that vCISO is focused on strategic risk and compliance objectives throughout the year, but some organizations require hands-on cybersecurity expertise. Our team of professionals are ready to jump in where you need us the most. Our experts are assigned based on your specific needs. <br><br>\n\n    <ul style=\"color:white\">\n        <li>Threat Hunting<\/li>\n        <li>Incident Response Program<\/li>\n        <li>Incident Tabletop Exercises (TTX)<\/li>\n        <li>Ransomware Prevention Program<\/li>\n        <li>Vulnerability Scanning and Vulnerability Management<\/li>\n        <li>Security Engineering and Architecture Assistance<\/li>\n        <li>Identity &amp; Access Management<\/li>\n        <li>Managed Detection and Response (MDR) with CrowdStrike<\/li>\n    <\/ul>\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0ef6dd6\" data-id=\"0ef6dd6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d05780c elementor-widget elementor-widget-icon-box\" data-id=\"d05780c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"#\" >\n\t\t\t\t\t\t\tRisk And Compliance\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tAt IPS, we help with your Risk and Compliance programs. We also setup standards that make sense for your industry. If a program already exists, we piggyback off of what you are currently doing and make adjustments as needed.<br><br>\n\n    <ul>\n        <li>SOC 2 Type I and 2 Planning<\/li>\n        <li>ISO 27001:2022 Delivery<\/li>\n        <li>Risk Assessments<\/li>\n        <li>Governance, Risk, and Compliance (GRC) Setup<\/li>\n        <li>Internal Audit of Controls<\/li>\n        <li>PCI, HIPAA, FERPA, FACTA, GLBA Programs<\/li>\n        <li>ISO 27001, NIST Cybersecurity Framework, CMMC and NIST 800-161 Programs<\/li>\n    <\/ul>\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What Is GLBA Compliance? The Gramm-Leach-Bliley Act (GLBA) is an act from congress that was put in place in 1999 to repeal the Glass Steagal Act of 1933. GLBA is also referred to as the Financial Services Modernization Act of 1999. While GLBA has many stipulations, there are two primary areas when it comes to Information Security requirements. This includes the Privacy Rule and the Safeguards Rule.\u00a0 Talk with Us Do I Need To Comply With GLBA? The FTC Safeguards Rule applies to many organizations that receive non public information (NPI). A few examples are listed below: Banking Financial Institutions Insurance Companies A retailer that issues its own credit cards An automobile dealership that leases automobiles A personal property or real estate appraiser In some cases, financial professionals A business that prints or sells checks Any business that wires money to and from customers Any check cashing business Accountants and tax preparation service companies Travel agencies Real estate settlement services Mortgage Brokers An investment advisory company or credit counseling service Companies that bring buyers and sellers together Higher Education institutions that receive federal student aid under Title IV of the Higher Education Act of 1965. What Can Happen If You Don&#8217;t Comply With GLBA? Replicate hacking techniques and exploits, such as unauthorized access and software exploitation, to identify your most vulnerable assets. There are a number of enforcement bodies within the United States. The FTC and federal banking agencies are the most common enforcement agencies. The other enforcement agencies can be the State Attorney General, the State Insurance Commissioners, or the Consumer Financial Protection Bureau. The Office of the Comptroller of the Currency and the Securities Exchange Commission are also enforcement bodies. The enforcement bodies may issue large fines. They may also issue consent orders that require security controls. The Consumer Financial Protection Bureau (CFPB) provides the latest enforcement actions on their website: IPS Strengths At A Glance Cyber Security Services (CSS) assists financial institutions, banks, credit unions, lending companies, higher education, and government organizations. We understand the requirements of GLBA compliance better than most due to the many hats that we wear. Here is how we help companies maintain GLBA compliance: GLBA Risk Assessments GLBA Gap Assessments Virtual CISO and Risk Services GLBA Policy Review Security Awareness Training Vendor Risk Assessments Penetration Testing Vulnerability Assessments Encryption Solutions Information Security Strategic Plans Inventory of Assets GLBA Data Classification Services Our External Penetration TestingProcess \u00a0Cyber Security Services (CSS) assists financial institutions, banks, credit unions, lending companies, higher education, and government organizations. We understand the requirements of GLBA compliance better than most due to the many hats that we wear. Here is how we help companies maintain GLBA compliance: Threat Protection And Response We understand that vCISO is focused on strategic risk and compliance objectives throughout the year, but some organizations require hands-on cybersecurity expertise. Our team of professionals are ready to jump in where you need us the most. Our experts are assigned based on your specific needs. Threat Hunting Incident Response Program Incident Tabletop Exercises (TTX) Ransomware Prevention Program Vulnerability Scanning and Vulnerability Management Security Engineering and Architecture Assistance Identity &amp; Access Management Managed Detection and Response (MDR) with CrowdStrike Risk And Compliance At IPS, we help with your Risk and Compliance programs. We also setup standards that make sense for your industry. If a program already exists, we piggyback off of what you are currently doing and make adjustments as needed. SOC 2 Type I and 2 Planning ISO 27001:2022 Delivery Risk Assessments Governance, Risk, and Compliance (GRC) Setup Internal Audit of Controls PCI, HIPAA, FERPA, FACTA, GLBA Programs ISO 27001, NIST Cybersecurity Framework, CMMC and NIST 800-161 Programs<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":409,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3532","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/pages\/3532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/comments?post=3532"}],"version-history":[{"count":1,"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/pages\/3532\/revisions"}],"predecessor-version":[{"id":31631,"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/pages\/3532\/revisions\/31631"}],"up":[{"embeddable":true,"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/pages\/409"}],"wp:attachment":[{"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/media?parent=3532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}