Our story

 

Celebrating over 20 years in executive management advisory and training services.

About Certified Information Security

Certified Information Security is a registered trade name for Certified Tech Trainers (CTT) (D-U-N-S# 010573009) (CAGE code: 3FKS0), a corporation registered in Florida, United States.

Certified Information Security delivers enterprise-grade training, certification, and advisory services built on globally respected cybersecurity and compliance frameworks. We partner with you to translate technical controls into business resilience — helping you protect what matters while enabling growth.  

  • ISO 31000 Enterprise Risk Management

    Establishing, governing, managing, deploying, testing, maintaining, and auditing risk management in conformance with ISO/IEC Standards 31000, 31010, and 27005. Learn more.
  • ISO 37301 Compliance Management

    Establishing, governing, managing, deploying, testing, maintaining, and auditing compliance management in conformance with ISO/IEC Standard 37301. Learn more.
    • Proof of competence is validated by the ISO 37301 CCP credentialing scheme. Learn more.

  • ISO 27001 Information Security Management

    Establishing, governing, managing, deploying, testing, maintaining, and auditing information security in conformance with ISO/IEC Standards 27001, 27002, 27003, 27005, 27007, and 27008. Learn more.
    • Proof of competence is validated by ISO 27001 Lead Implementer, Architect, and Lead Auditor credentialing schemes. Learn more.

  • ISO 42001 AI MAnagement System Training

    Establishing, governing, managing, deploying, testing, maintaining, and auditing information security in conformance with ISO/IEC 42001, 23894, and 42005. Learn more.
    • Proof of competence is validated by ISO 42001 Lead Implementer and Lead Auditor credentialing schemes. Learn more.


  • NIST AI Risk Management Framework 1.0

    Establishing, governing, managing, deploying, testing, maintaining, and auditing information security in conformance with the NIST AI RMF Framework. Learn more.
    • Proof of competence is validated by the NIST AI RMF 1.0 Architect credentialing scheme. Learn more.

  • NIST Cybersecurity Framework (CSF)

    Establishing, governing, managing, deploying, testing, maintaining, and auditing cybersecurity in conformance with the NIST Cybersecurity Framework (CSF). Learn more.
    • Proof of competence is validated by NIST CSF credentialing schemes. Learn more.

  • Cloud Security

Cloud Security essentials training and best practices advisory. Learn more.

  • ISO 22301 Business Continuity Management

    Establishing, governing, managing, deploying, testing, and maintaining a business continuity and disaster recovery management system in conformance with the ISO 22301 standard. Learn more.
  • Fraud Prevention, Detection, and Investigation

    Managing and minimizing risk of internal fraud and abuse utilizing professional techniques for fraud risk evaluation, prevention, detection, investigation, and recovery. Learn more.
    • Proof of competence is validated by the CFCA, CFCP, and CFCM credentialing schemes. Learn more.

  • ISO 37001 Anti-Bribery and Anti-Corruption

    Establishing, governing, managing, deploying, testing, maintaining, and auditing anti-bribery and anti-corruption management in conformance with ISO/IEC Standard 37001. Learn more.
    • Proof of competence is validated by the ISO 37001 CABCM certification scheme. Learn more.
    • Policy advisory and gap assessment audits are available. Contact us for details and a quote.
       
  • Third-Party Professional Certification Exam Preparation

    • Preparing for ISACA's CISA, CRISC, and CISM certification exams. Learn more.
    • Preparing for (ISC)2's CISSP certification exam. Learn more.
    • Preparing for Cybersecurity Alliance's Certificate of Cloud Security Knowledge (CCSK) exam. Learn more.

At Certified Information Security, we understand and respect that our training is ultimately judged by the return your organization realizes from its corresponding investment. Each of our custom-designed workshop-oriented seminars prove their value by providing explicit and tangible recommended actions for achieving early and measurable improvement and savings. Our customers leave our seminars with a clear action plan for moving forward.

The Certified Information Security Body of Professionals

In a world fraught with personal and corporate financial insecurity, the need for skilled and knowledgeable business professionals has never been greater. Compliance with local and international laws and industry regulations have raised the bar for professional business practices expected of organizations, which have in turn increased the need for professionals who know how to help organizations fulfil and document compliance with the new laws and regulations. Establishing and maintaining a solid risk-based approach to managing information security, business continuity/disaster recovery, and fraud control is no longer simply a good thing for organizations to do. Today, regulators demand it. In 2010, Certified Information Security organized a members-only forum of professionals to provide a vehicle for occupational identification and validation for experts in information security, fraud control, and business continuity management.