Covenant Awareness, Training and Education Resource System (CATERS)
Our education and training program is designed to offer cybersecurity awareness training and certification programs to government, academia and the private sector, domestically and abroad. Our product line includes white papers, webinars, free courses, instructor-led and eLearning courses hosted on the Covenant Awareness, Training and Education Resource System (CATERS) learning management system. Please see our course catalog.
CATERS hosts our training marketplace which includes free courses through our partnership with The Defense Information Systems Agency (DISA). Upon registering for an account in CATERS students have 24/7 worldwide access to a variety of cybersecurity training and awareness tools. Watch “Cyber Security Training.” on YouTube.
Covenant offers training and tools of various sources to influence the security culture in business environments world-wide, unlike any other cybersecurity solutions provider.
Our mission is to:
- empower people (world-wide cybersecurity workforce)
- educate the cybersecurity community using strategically devised processes
- offer unsurpassed product line to promote cybersecurity awareness, training and education
- leverage partnerships to validate the power of collaboration in delivering relevant, real-world solutions through relationships that complement our uniqueness in strengthening end-to-end security and trustworthiness throughout cyberspace.
There’s strength in numbers; our strategic partnerships set us apart from other education and training providers and demonstrates how we complement each other. Our partners support CSS in fostering a marketplace community for the cybersecurity workforce. CATERS serves as a 1-Stop Shop for Cybersecurity Awareness, Training and Education resources and services.
Our goal is to:
- bring worldwide awareness to the importance of protecting our assets
- offer innovative, customized education to stakeholders world-wide on industry best practices
- ensure appropriate tools are available to promote the protection of assets in assorted environments
Through collaboration CATERS delivers value and educates the workforce by way of hosting awareness, training and education products that have been built and proven effective by the top talent in the field (iron sharpens iron). Our boots on the ground serve as subject matter experts in building our product line. We offer the total package enabling our cybersecurity workforce to work more effectively.
Vulnerability Assessment Service
Simple, fast i.e 7-10 business days, to provide actionable information one of your growing risk: Cyber.
Vulnerability Assessment Definition
A vulnerability assessment is a process that identifies, quantifies, and prioritizes (i.e., by the creation of a hierarchy) the vulnerabilities in an environment.
Our Vulnerability Assessment Service Identifies Your Security Weaknesses
Attackers gain access to and exploit your environment through vulnerabilities that exist across your systems and applications. Your risk exposure is heightened due to the fact that Internet connected applications and systems hold data that have an inherent monetary value.
- In 2013, 400 million credit card numbers, social security numbers, and other personal information were stolen1.
- Average cost of a US Data Breach: $5.4 million.
- Cost to US companies: $188 per compromised data record2.
Personally Identifiable Information (PII) such as birthdates and social security numbers, customer and client contact information, employee healthcare data, company plans and designs, intellectual property and competitive business information, and credit card numbers are easily converted to money by cyber criminals. These intruders are determined to obtain all data with a “street value” greater than the penalty they face if caught. A vulnerability assessment can help you understand where your protection is deficient and allow you to begin proactively eliminating intrusion opportunities.
The Covenant Security Solutions Vulnerability Assessment Service will illuminate defects within your network that can be utilized by attackers. Our certified security engineers will assess your organization’s susceptibilities by employing the best commercial and publically available tools as well as manual techniques. As risk assessment professionals, our experienced experts provide information assurance and security services to both private and public entities including the most highly classified operational systems within the Federal Government. While custom options are available, in general, our vulnerability assessment will evaluate your firewalls, routers, web servers, databases, and network connected devices.
What Our Vulnerability Assessment Service Will Do For You
Provide A Network Security Evaluation
Help your organization by testing for and discovering vulnerabilities and network security gaps combined with recommendations that will allow you to take specific steps to improve your security posture.
Answer Your Most Important Security Questions
- “What information security weaknesses do we have?”
- “How can we address our information security liabilities?”
- “What should we remediate first?”
- “Which issues are the most critical?”
Test Your External And Internal Assets
Externally testing your environment will reveal vulnerabilities exploitable by an attacker outside of your organization attempting to break in. Internal testing will expose vulnerabilities within the systems, applications, and network infrastructure that reside behind your trust barrier.
Help You Meet Your Compliance Requirements
Our Vulnerability Assessment Service can help your organization meet periodic compliance requirements by scanning your environment for vulnerabilities and providing a list of remediation objectives.START NOW
Other Services You May Be Interested In
- Risk Assessments
- Security Engineering
- Information Security Training
- Cyber Operations Support
1Cenzic 2014 Application Vulnerability Trends Report
2Poneman Institute 2013 Cost of Data Breach Study: Global Analysis
Covenant Security Solutions Has Made the Inc. 5000 List of the Fastest-Growing Private Companies in America for 2014.
Covenant Security Solutions, has made the Inc. 5000 list of the fastest-growing private companies in America for 2014. This achievement puts us in rarefied company. The elite group we’ve now joined has, over the years, included companies such as Microsoft, Timberland, Vizio, Intuit, Chobani, Oracle, and Zappos.com.
Covenant Security Solutions, Inc. Launches: Cybersecurity Fundamentals e-Learning Course.
Covenant Security Solutions, Inc. launches: Cybersecurity Fundamentals e-Learning Course.
Human error is one of the largest cyber threats to organizations. Most employees and team members mean well but don’t have the information to protect your company’s assets or themselves in cyberspace. . This half hour interactive and scenario based training session is available anytime online . It is designed to deliver foundational information necessary for your team to protect themselves and your company.
Please check out our demo: Cyber Security Training
Covenant Security Solutions Inc. was Pleased to Sponsor the TINYg Terrorist Information New York Group
Covenant Security Solutions Inc. was pleased to sponsor the TINYg Terrorist Information New York group) hosted by Mizuho Corporate Bank Ltd. TINYg is an international forum providing free membership and information to its subscribers. We provide up to the minute information from all corners of the globe and it is shared to assist organizations in combating terrorist threats. Regular conferences of TINYg are held in both London and the USA and are graced by a host of renowned international speakers. Covenant, in conjunction with the sponsors, is planning to expand the conferences to the Washington DC area and Chicago, IL.
We encourage you to stay tuned and request membership here.
If you are interested, please review this brochure to get insight on the New York Conference here. TINYg Brochure
Covenant Continues to Offer Free Webinar Series of Industry Leaders in Cyber Security.
Covenant continues to offer our Free Webinar series of industry leaders in Cyber Security. We have lined up a great set of speakers this Spring, who will give you 30 minutes of food for thought. Sessions include discussions around current cyber threats, cyber tools and cybersecurity tips practiced by real- world subject matter experts. Featured speakers include:
April 2015: TK Eppley Chief of Staff Silent Circle, LLC
TK Eppley is the Chief of Staff at Silent Circle. He manages a dynamic company of thought leaders at what Fast Company calls one of “The World’s Top 10 innovative Companies of 2015” which has created the world’s first Enterprise Privacy Platform. In a post Sony world where Privacy and Security is no longer a CSO/CIO issue, but a Board Room Issue, Silent Circle’s Suite of Hardware, Software & Service make it the trusted advisor and provider of Enterprise Privacy Products. Mr. Eppley is at the forefront and speaks frequently on matters of Personal & Enterprise Privacy.
May 2015: Aurobindo Sundaram Vice President – Information Security Assurance & Data Protection Reed Elsevier
Mr. Sundaram is responsible for all aspects of fraud detection, investigations, and incident response for Reed Elsevier, including the protection of $4B in annual revenue, 15000+ employees, and services provided in 100+ countries for the LexisNexis brand. He works with Reed Elsevier divisional CTOs and divisional CISOs to implement security initiatives and programs that achieve the organization’s mission, goals and objectives. Chair the RE Information Security Council (ISC), the body that sets security strategy for the company and ensure that the agenda of the ISC reflects the key security concerns of the company as identified by the company’s CTOs.
This is an Instructor-led Cyber Insider Threat Course that can be taken both in person or online. Our class provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization.