

GET A GRIP
ON YOUR SENSITIVE
CORPORATE AND CUSTOMER DATA.

Information Security and Technology Consulting
-
Expert assessment of your existing controls and recommendations for improved security
-
Expertise in ISO 27001, GDPR, SOC/SSAE 18 controls/procedures
-
Provider of security awareness training tools
-
General information technology consulting services available
-
Product ideation/development services -- expertise deploying prior products including cloud storage, satellite TV nationwide service, digital video, speech recognition, IOT


Operations and Security Controls Reviews
Many businesses build and deploy the systems to run their business independent of security considerations, until trouble comes. We can evaluate and and recommend a cohesive integration of controls that meet operational, security, and financial/regulatory requirements.

Compliance
​
​
Detailed assistance in ISO 27001, SSAE18, and recent privacy regulations including EU General Data Protection Regulation (GDPR) and various US state legislation including CCPA.
We can identify the audit trails you will want to keep to validate controls are working, and to be compliant with audit and/or regulatory requirements.

Process and Controls Documentation
We're great at helping maximize the efficiency and accuracy of your documentation, whether it be operational standard operating procedures, security policies and related technology standards documents, and/or privacy standards and implementations to meet the latest regulatory requirements.

Security Awareness
Having a comprehensive security awareness program lowers the vulnerability of your employee base, one of the biggest sources of breach. Achieving Security offers training modules, screen savers (company branded for you if desired), and can even facilitate phishing campaigns to gauge the effectiveness of the awareness program.

Network Security
Aligning the ISO 27001 control set with your network security is critical in ensuring you are maximizing your protection based on your existing budget. We can provide an independent review of your controls and suggest additional features based on priority and cost.
​
​
​

Privacy
Privacy is becoming a big thing. You've had to live with HIPPA for awhile, but SSAE18 controls govern managing third party data securely, and you must look out for General Data Protection Regulation and emerging privacy standards like CCPA, the new California Consumer Privacy Act. Make sure you are not only complying, but "doing the right thing" for employees too.

Complete IT SECURITY controls review
Regularly $5,995 now $4,495 USD
A cohesive approach to security includes vulnerability assessments, network security assessment, penetration testing, and security program assessment. Achieving Security is offering its independent controls review, providing our assessment of your firm's adherence to the 114 controls detailed in ISO 27001:2013. It's a great complement to occasional penetration testing, at a fraction of the price. This work will be performed remotely for your safety.

Security Controls Review
includes:
-
Up to 20 hours of remote interviews to ascertain status for all 114 controls covering 14 security domains
-
Additional investigation when data/answers are incomplete
-
Summary of key concerns, and recommended resolution actions
-
Final report provided ~2 weeks after project start
Benefit: provides management an independent view of firm's network security, and overall security program posture.

ABOUT US
Achieving Security is based in the Dallas-Fort Worth area. Our personnel have decades of experience in IT Security and risk management.
The principal of Achieving Security spent the prior 8 years in two CISO roles, for a joint venture of AT&T, Verizon, and T-Mobile as well as a global logistics company operating in 20 countries.
The firm has IT controls related financial audit and ISO 27001 accredited auditors on staff to assist you. Its employees have CISSP accreditation and over 35 granted US patents.
Strangely, we find Internet Security fascinating and fun and can't wait to bring our network and information security, privacy, risk management, and compliance expertise to help you protect your business.