We have developed a proprietary approach to assessing information security risks. Our approach gives you a full picture of your risks with recommended solutions for optimal information security management.
Full Transparency
We strongly believe in empowering our customers. The more knowledge transfer that occurs, the more value our customers recognize. We fully disclose the methods, tools, and configurations used.
Product Agnostic
We do not represent any third-party products or services on purpose. Our projects and recommendations stand on their own, with no ulterior motive to sell you things you don’t really need in order to effectively manage your company’s information security.
We help you implement guidelines for securing client data by adhering to regulations and guidelines that may impact your organization, your employees and your agents
https://frsecure.com/wp-content/uploads/2020/12/empowering-personal-security-part2-01-scaled.jpg13372560Jess Kooiman/wp-content/uploads/2018/05/FRSecure-logo.pngJess Kooiman2020-12-17 15:44:062020-12-17 15:45:12How to Tell if Your Phone is Hacked: Empowering Personal Security, Part 2
https://frsecure.com/wp-content/uploads/2020/12/golden-ticket-blog-header-resources-01-scaled.jpg13372560FRSecure/wp-content/uploads/2018/05/FRSecure-logo.pngFRSecure2020-12-07 16:13:392020-12-07 17:43:11Detecting and Preventing a Golden Ticket Attack
https://frsecure.com/wp-content/uploads/2020/11/RDP-blog-header-resources-01-scaled.jpg13372560FRSecure/wp-content/uploads/2018/05/FRSecure-logo.pngFRSecure2020-11-24 15:05:082020-12-09 13:33:12Making Sense of RDP Connection Event Logs
https://frsecure.com/wp-content/uploads/2020/11/File-System-Forensic-Analysis-Creating-an-Initial-Timeline.png441845FRSecure/wp-content/uploads/2018/05/FRSecure-logo.pngFRSecure2020-11-20 13:55:162020-12-21 04:37:05File System Forensic Analysis: Creating an Initial Timeline
https://frsecure.com/wp-content/uploads/2020/11/empowering-personal-security-part1-01-scaled.jpg13372560Jess Kooiman/wp-content/uploads/2018/05/FRSecure-logo.pngJess Kooiman2020-11-13 07:00:002020-12-18 11:33:27Understanding Digital Abuse: Empowering Personal Security, Part 1
https://frsecure.com/wp-content/uploads/2020/11/second-mental-health-blog-header-scaled.jpg13372560Jess Kooiman/wp-content/uploads/2018/05/FRSecure-logo.pngJess Kooiman2020-11-10 11:59:492020-12-18 11:33:12How to Manage Stress and Anxiety in Information Security During the Pandemic
https://frsecure.com/wp-content/uploads/2021/01/under-the-hood-january-recap-featured-image.png441845Brandon Matis/wp-content/uploads/2018/05/FRSecure-logo.pngBrandon Matis2021-01-08 17:07:562021-01-08 17:07:57Under the Hood January 2021: Monthly Cyber Threat Intel Series
https://frsecure.com/wp-content/uploads/2020/11/Under-the-Hood-Monthly-Cyber-Threat-Intel.png441845Brandon Matis/wp-content/uploads/2018/05/FRSecure-logo.pngBrandon Matis2020-12-03 10:34:202021-01-08 17:12:52Under the Hood: Register for Our Monthly Cyber Threat Intel Series
FRSecure offers a wide range of services at a fraction of the cost of their competitors.
Jeff SchwendingerVice President Operations, SERVICE 800
This [full security] assessment is helpful as it gives us a foundation on which to mature our program, develop new policies and rework current practices.
Joyce BeckDirector of IS, Douglas County Hospital
Certifications
The staff at FRSecure are certified in the following areas:
ACMP
Aruba Certified Mobility Professional
CAPM
Certified Associate in Project Management
CCFE
Certified Computer Forensics Examiner
CCISO
Certified Chief Information Security Officer
CCNA
Cisco Certified Network Associate
CCSK
Certificate of Cloud Security Knowledge
CCSP
Certified Cloud Security Professional
CHFI
Computer Hacking Forensic Investigator
CIHE
Certified Incident Handling Engineer
CISA
Certified Information Systems Auditor
CISM
Certified Information Security Manager
CISSP
Certified Information Systems Security Professional
CMMC-RP
Cybersecurity Maturity Model Certification – Registered Practitioner
CNFE
Certified Network Forensics Examiner
CNSS 4011
Committee on National Security Systems 4011
CNSS 4013
Committee on National Security Systems 4013
CNSS 4014
Committee on National Security Systems 4014
CNSS 4016
Committee on National Security Systems 4016
CompTIA A+
CompTIA Security+
DoD Advanced AIS
Department of Defense Advanced Automated Information Systems
DoD AIS
Department of Defense Automated Information Systems
DoD FSO
Department of Defense Facility Security Officer
ECIH
Certified Incident Handler
ECIH v2
Certified Incident Handler
EDP
Electronic Document Professional
GCFA
GIAC Certified Forensic Analysts
GCIH
GIAC Certified Incident Handler
GSLC
GIAC Security Leadership Certification
GSLC
GIAC Security Leadership Certification
GXPN
GIAC Exploit Researcher and Advanced Penetration Tester
ISA
International Society of Automation
ISO 270001 ISMS Auditor
ITIL Foundation
Information Technology Infrastructure Library
MCSA: Windows Server 2012
Microsoft Certified Solutions Associate
OSCP
Offensive Security Certified Professional
PCI DSS QSA
PCI DSS Qualified Security Assessor
PCIP
Payment Card Industry Professional
PMP
Project Management Professional
SEC+
Security+
WCSP-XTM
WatchGuard Certified System Professional
FRSecure Security Risk Assessments
Our comprehensive risk assessment is designed to discover and quantify information security risk. An industry standard utilized by security practitioners around the country, our standard builds effective information security programs and provides organizations with the data necessary to prioritize and maximize information security investments. Quantification of risk also provides the pivotal common language for security practitioners and executives to speak about risk. This allows organizations to set risk tolerance thresholds and eases the process of determining how much money to spend.