vCXO Program

Virtual CXO Services

Founders Innovative Technology, LLC (“FIT”), a Founders Federal Credit Union CUSO, provides the services of a Virtual Chief Information Security Officer. The FIT vCISO/vCIO/vCTO/vCOO/vCSO Service provides senior leadership and direction for your Information Security requirements. Our services also include CISO Advisory Services that support active CISOs, or Interim CISO Services which offer support for organizations looking to fill a permanent position. Trust our certified professionals to guide your organization in providing enterprise vision, strategy, and programs to ensure information assets and technologies are adequately protected. FIT can tailor services depending on the specific needs of your organization.

By partnering with FIT, your organization gains access to a team of professional analysts and architects that will work alongside your technical staff. Our FIT team has earned the following certifications:
▪ ISACA CDPSE (Certified Data Privacy Solutions Engineer)
▪ ISACA CISM (Certified Information Security Manager)
▪ ISACA CRISC (Certified in Risk and Information System Controls)
▪ CAC (Cybersecurity Audit Certificate)
▪ PMP (Project Management Professional)

 

FIT Program Services

  • Governance of Information Technology
    ▪ Policy Program
    ▪ ACET Overview
    ▪ Digital Transformation Program
    ▪ IT Strategic Mapping
    ▪ 24×7 Support Contact
    ▪ IT Job Description and Business Objectives Overview
  • Cybersecurity Awareness Program
    ▪ Social Engineering (Phishing & Vishing)
    ▪ Employee Training
    ▪ Board of Directors Training
    ▪ Cybersecurity Awareness Month Strategy
  • Cybersecurity Health Check
  • Business Continuity
  • Disaster Recovery
    ▪ Backup and recovery strategies
  • Audit/Risk Management
    ▪ Participate in Audit reviews (onsite or virtual)
    ▪ Assist in prioritizing findings
    ▪ Assist in remediation efforts
  • Board Reporting
    ▪ ISP Reporting
    ▪ BOD Information Technology Report
    ▪ Cyber Control Spotlight
  • Incident Response
    ▪ Program Assessment
    ▪ Tabletop Exercise
    ▪ Ransomware Tabletop
  • Information Security Policy and Procedures
  • Operational Security Gap Analysys
    ▪ Vulnerability Assessment
    ▪ Firewall Reviews
    ▪ Access Reviews
    ▪ Patching
  • Controlled Self-Assessments (CSAs)
  • Enterprise Security Architecture
  • Patch Management
  • Configuration Management
  • Change Control Management Program
  • Physical Security Assessment
  • Endpoint Security Assessment
  • Internal/External Penetration Testing
  • Remote Access Assessment
  • Data Loss Prevention Assessment
  • CISO Consulting
  • Privileged Access Management (PAM)
  • Software Asset Management (SAM)