top of page
![](https://static.wixstatic.com/media/1e4592_497049de610647f4ab60b37a4237bb85~mv2.jpg/v1/fill/w_288,h_163,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_auto/1e4592_497049de610647f4ab60b37a4237bb85~mv2.jpg)
![SiD Logo 1a.png](https://static.wixstatic.com/media/1e4592_94f4a58e00c749b782bba32cf707868b~mv2.png/v1/fill/w_240,h_125,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/SiD%20Logo%201a.png)
![](https://static.wixstatic.com/media/1e4592_a04466f03287408d904b21438bfcf7e9f000.jpg/v1/fill/w_47,h_26,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_auto/1e4592_a04466f03287408d904b21438bfcf7e9f000.jpg)
Board of Directors' Consultants
![](https://static.wixstatic.com/media/1e4592_7cf697569f4e40e193c04a265d6f9f64~mv2.jpg/v1/fill/w_74,h_74,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_auto/1e4592_7cf697569f4e40e193c04a265d6f9f64~mv2.jpg)
Cyber Insurance
-
Cyber Insurance Vendor Vetting
-
Pre-Qualification Planning & Implementation
-
Real-time Notification of Policy Requirement Breach
Board of Directors Risk Management
-
Cyber Risk Monitoring and Management
-
BC/DR Planning and Management
-
Real-time Monitoring and Management of GRC to IT Controls
War Games Training
-
Performed at your place of business
-
Includes your IT, Cyber and Management Teams
-
Multiple Real-World Scenarios
-
Debrief & Guidance for Improvements
![](https://static.wixstatic.com/media/1e4592_7b29aeef72ba4b7ca78b3141052b577d~mv2.jpg/v1/fill/w_98,h_74,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_auto/1e4592_7b29aeef72ba4b7ca78b3141052b577d~mv2.jpg)
![](https://static.wixstatic.com/media/bc3ec7bc825c4e6ca746c659189cea83.jpg/v1/fill/w_48,h_27,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_auto/bc3ec7bc825c4e6ca746c659189cea83.jpg)
"You can't hold firewalls and intrusion detection systems accountable. You can only hold people accountable."
— Daryl White, DOI CIO
![](https://static.wixstatic.com/media/1e4592_a04466f03287408d904b21438bfcf7e9f000.jpg/v1/fill/w_47,h_26,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_auto/1e4592_a04466f03287408d904b21438bfcf7e9f000.jpg)
bottom of page