Information Security Assurance Training and Rating Program

Please keep your contact information current.
Please contact isatrp (at) isatrp.org if you feel your information needs updating.

Information Security Info
Information Security Assurance

ISAM Certified People
ISAM Certification Classes
CPE Requirements

ISRM Certified People
ISRM Certification Classes
CPE Requirements

Rated Organizations

Other IAM Certified People
IEM Certified People

IA Regulations Comments

SH logo with link

"Information Security Vulnerabilities: Technical and Non-Technical Solutions

The first step of any successful Information Security Program is the understanding of the missions, critical information supporting the missions, and the information flow throughout the Information Technology infrastructure. Too many organizations spend tremendous amounts of resources implementing "secure" hardware, only to have their information exploited by a lack of proper security procedure.

The ISATRP provides methodologies and frameworks for understanding an organization's security posture, both technical and non-technical. The ISATRP also provides a mechanism for appraising the maturity of an organization's ability to perform the security posture reviews.

Contact Us

© 2013 Security Horizon, Inc.
All rights reserved