Helping Enterprises Realize Operational Security

HEROS™ is an innovative program designed to support Small and Medium Businesses (SMB) in the management of their organizational risk.

Why HEROS?

As many industries rely on secure technology to remain competitive and relevant in an increasingly connected environment, increased security risk is a reality of business operations. This program brings the expertise of globally certified professionals to organizations lacking “in-house” cybesecurity staff.

Federal Contractors with requirements for a cybersecurity plan that meets the Risk Management Framework (RMF) or Federal Information Security Management Act (FISMA) requirements gain compliance through the HEROS program.

Medical and Dental practitioners needing verification of HIPAA, PHI, PHI, FDA and other compliance standards are also served through this program.

What the program includes

Plan of Action and Milestones (POAM)

The POAM is a required document for many compliance regulations. This report contains a list of all activities necessary to address security issues. The POAM is an actionable list (in Excel) which provides a prioritized list of actions recommended for the organization. This list includes:

  • a. Action
  • b. Security Control
  • c. Dependency
  • d. Risk Level - Low, Medium, High, Critical Based on the National Vulnerability Database
  • e. Reference

Training

Three levels of training are provided to
organizations:

  • a. User training –to operational users of an organization’s technology
  • b. Technologist – Up to date training for technical teams charged with maintaining systems, applications and databases.
  • c. Executive – training designed for business owners, managers and executives.

Vulnerability Scans

Vulnerability scans are completed by cybersecurity technologists at RNT who hold certifications such as Certified Information System Security Professional (CISSP) and Certified Ethical Hacker (CEH). These scans include external penetration tests which identify vulnerabilities and attack vectors which may be in evidence for a specific organization.

Policy and Procedures Review and Gap Analysis

The documentation for each organization and industry is unique. The RNT Business Analysts are proficient in design and development of documentation. These professionals review and recommend specific documents which address the clients’ security needs.

Professional Project Management

Project Managers at RNT are certified through the Project Management Institute and have additional training and certification in cybersecurity.

Help Desk Support

Up to four hours per month of cybersecurity consultation is included in the service.

Work with Us