Information Security and Compliance Services

CoNetrix Security specializes in providing information and cyber security services to banks, savings associations, credit unions, and trust companies. Our extensive experience in working with financial institutions through examinations and audits makes us uniquely qualified to provide these services. CoNetrix security specialists understand the technology and applications utilized in the financial industry as well as the regulatory requirements and guidance. We strive to provide superior service and customer satisfaction. To see how CoNetrix Security customers rate us, click here. Below are a few of our security and compliance products and services.

Information Security Consulting

Boost Consulting solutions are designed to assist financial institutions with their information security, cyber security and compliance needs by providing professional consultants who are qualified security experts in the financial industry.

Boost Consulting offers the following services:

  • Virtual Information Security Officer—VISO Consulting complements your organization’s existing ISO role by providing comprehensive development of an information security program
  • Consulting on Retainer—Offers regular contact with a dedicated consultant on an annual basis covering any topic of your institution's information security program
  • Boost RA—Assists in the development and maintenance of an Information Security Risk Assessment
  • Boost BCP—Assists in the development and maintenance of a Business Continuity Plan
  • Boost POL—Assists in the development and maintenance of the institution's Information Security Policies
  • Boost VM—Assists with the institution's vendor management program
  • Boost CAT—Provides consulting and services association with the Cybersecurity Awareness Tool
  • Boost AM—Provides audit and exam management services
  • Boost IM—Assists in the development of an incident response plan
  • Workshops for Tandem—Offers short-term one-on-one consulting for a single Tandem product

Penetration Testing

Attackers are constantly searching for vulnerable systems. Adding new technologies and employees can increase the attack surface of your perimeter. Let us help you find gaps so you know where to reinforce your security.

Pen Test Services

CoNetrix Security offers the following penetration testing services:

Additionally, we can provide custom engagements based on your organization's size and complexity so you get the right testing frequency and coverage.

IT Audit & Vulnerability Assessment for Financial Institutions

A CoNetrix Security IT Audit and Vulnerability Assessment of your company's information systems will help you comply with regulatory guidance, the Gramm-Leach-Bliley Act (GLBA), and industry best practices while also helping improve your institution's security.

Key Areas Analyzed

A CoNetrix Security IT Audit and Vulnerability Assessment uses a risk-based approach to analyze information and cyber security controls, infrastructure, policies, and procedures. Our IT Audit and Vulnerability Assessment covers the following key areas:

  • Access and Data Management
  • Business Continuity Planning
  • Cyber Event Detection – Monitoring, Alerting, and Review
  • Cyber Incident Response
  • Cyber Threat – Vulnerability Detection
  • Cyber Threat Intelligence – Gathering, Sharing, Use
  • Device and Endpoint Security
  • IT Asset Management
  • IT Audit Independence
  • IT Infrastructure Management
  • IT Oversight, Strategy, and Policy
  • IT Patch Management
  • IT Risk Management and Risk Assessment
  • IT Staffing, Security Training and Company Culture
  • Vendor Management

In addition, we can customize the audit engagement to fit your needs. Ask us about additional coverage options, including:

  • Core Server Operating System
  • Remote Deposit Capture (RDC)
  • Virtual Infrastructure
  • Branch Visits
  • Secure Coding Practices
  • Identity Theft Prevention Program (ITPP)
  • Wireless Assessment
  • Microsoft 365 Assessment
  • Application Review (for additional in-scope applications)