Home

ISATRP


Information Security Assurance Training and Rating Program


Please keep your contact information current.
Please contact isatrp (at) isatrp.org if you feel your information needs updating.


Information Security Info
Information Security Assurance

ISAM Info
ISAM Certified People
ISAM Certification Classes
CPE Requirements

ISRM Info
ISRM Certified People
ISRM Certification Classes
CPE Requirements

ISA-CMM Info
Rated Organizations

Other IAM Certified People
IEM Certified People

IA Regulations Comments

SH logo with link

"Information Security Vulnerabilities: Technical and Non-Technical Solutions

The first step of any successful Information Security Program is the understanding of the missions, critical information supporting the missions, and the information flow throughout the Information Technology infrastructure. Too many organizations spend tremendous amounts of resources implementing "secure" hardware, only to have their information exploited by a lack of proper security procedure.

The ISATRP provides methodologies and frameworks for understanding an organization's security posture, both technical and non-technical. The ISATRP also provides a mechanism for appraising the maturity of an organization's ability to perform the security posture reviews.


Contact Us

© 2013 Security Horizon, Inc.
All rights reserved