Consulting Services

 

Cybersecurity

  • Cybersecurity Posture Assessment
  • Webinars
  • CIS Controls Implementation
  • Incident Response Planning
  • Data Breach Planning
  • Business Continuity Planning
  • Disaster Recovery Planning
  • Risk Assessment
  • School Cybersecurity Implementation Manual
  • CTO Consulting

 

Fiber-Optic Design

  • K12 Self-Provisioned Fiber Consulting
  • Fiber-Optic Wide Area Network Design
  • Fiber-Optic Local Area Network Design
  • RFP Specifications
  • RFP Evaluation
  • ERate Guidance
  • CTO Consulting

 

 

We are an awarded vendor with several cooperatives, including:

 

Region 01 - BuySpeed

Region 08 - TIPS

Region 02 - GoodBuy

Region 15- 791 Coop

Region 06 - EPIC6

Region 19

Region 07

 

 

Current Pricing Sheet

School Cybersecurity Implementation Guide

June 1, 2024

 

C1 Cyber is currently preparing to publish a 388 page manual that will guide school district technology staff in fully implementing The Center for Internet Security (CIS) Controls version 8.  Two years in the making, this comprehensive manual serves as a guide for implementation of the safeguards contained in the Center for Internet Security (CIS©). 

 

Click here to view sample pages

 

This manual will help staff to understand what each of the 18 Controls and 153 Safeguards represent, and guide staff in the steps necessary to implement each Safeguard.   Whether your district needs assistance figuring out where to start, or you are somewhere in the implementation process, this manual will assist by clearly defining what each of the Safeguards mean, and tips to proper implementation.

 

Appendices cross reference the Controls and Safeguards that make up the CIS Controls v8, to the Texas Department of Information Resources (DIR) Cybersecurity Framework (CSF), the National Institute of Science and Technology (NIST) CSF, and the C1 Cyber Cybersecurity Posture Assessment.  This manual is a must have for any school district actively seeking to improve their cybersecurity maturity.

 

Jeffrey W. Harris, the author, retired as a US Army intelligence officer prior to spending over 20 years as Executive Director for Technology at Weslaco Independent School District in Texas.  He holds a Bachelors in Computer Science, a Masters of Education n Instructional Technology, a Micro Masters in Cybersecurity from the Rochester Institute of Technology, and is a Certified Information Security Manager (CISM) through ISACA.