Information Security Awareness From access control to zeroization and everything in between, we’ve got security best practices covered. Summit clients appreciate our active, energetic, and engaging approach to training staff on information security best practices. We are passionate about our profession and that enthusiasm is conveyed to our students when we train them on security concepts. When you grow tired of the same sleepy, monotonous web-based security training, give us a call and we’ll train your organization in the latest security concepts in a fun and engaging class that gives every student the opportunity to interact with a seasoned security professional.
Penetration Testing & Vulnerability Assessments Penetration Testing & Vulnerability Assessments (sometimes collectively referred to as “pentesting”) measure the ability of your technical environment to withstand an attack launched by an attacker seeking to undermine the security of the infrastructure, systems, or data stored within them. During this type of assessment, Summit’s team of security engineers use a variety of technical tools coupled with manual testing techniques to discover, test, analyze, and describe weaknesses in the environment.
Risk Assessment & Management Risk assessments are the cornerstone of an effective security program. They are also required by many regulatory compliance regimes and security frameworks. Without an accurate assessment of Information Security risk, your organization is running blind through a minefield of threats and vulnerabilities. Summit risk assessments can be general in nature, but most often support our clients’ compliance with a specific regulation or framework such as HIPAA, ISO 27001, NIST SP800-53, or PCI-DSS.