Frequently Asked Questions

Where are your services offered?

We offer our services throughout the United States.

What industries do you serve?

Our clients include financial institutions, healthcare organizations, government agencies, higher education, utilities, and other businesses nationwide.

Who is going to perform the actual work?

As an independent information security firm, we do not represent any vendor, nor do we sell hardware or software. All work is performed by a certified Tyler Cybersecurity professional.

What are the qualifications of your experts?

Our security experts attend ongoing training and are continuously learning. They hold a variety of certifications including:

  • Certificate of Cloud Security Knowledge (CCSK)
  • Certified Information Systems Auditor (CISA)
  • Certified Information Security Manager (CISM)
  • Certified Information Systems Security Professional (CISSP)
  • Cisco Certified Network Associate (CCNA)
  • Computer Hacking Forensic Investigator (CHFI)
  • GIAC Law of Data Security & Investigations (GLEG)
  • GIAC Penetration Tester (GPEN)
  • GIAC Security Essentials (GSEC)
  • GIAC Web Application Penetration Tester (GWAPT)
  • Microsoft Certified Solutions Expert (MCSE)
  • Network+
  • Offensive Security Certified Professional (OSCP)
  • Offensive Security Wireless Professional (OSWP)
  • Security+
  • Social Engineering Pentesting Professional (SEPP)
  • Systems Security Certified Practitioner (SCCP)

What are your methodologies based on?

The Tyler Cybersecurity Methodology leverages a variety of industry-standard frameworks and regulatory guidance, including: Federal Financial Institutions Examination Council (FFIEC), National Security Agency (NSA) Gold Standard, National Institute of Standards and Technology (NIST), ISO 27002 standards, and Centers for Medicare & Medicaid Services (CMS) guidelines.

What is Tyler's approach to cybersecurity?

At Tyler Cybersecurity, we believe that cybersecurity is more than a cost-center or simply a compliance requirement. It's a commitment to honor those who have entrusted you with their information assets. It is a shared responsibility and a civic duty. Our goals is to partner with our clients to create and sustain environments that realistically and cost-effectively protect information assets while maintaining a balance of productivity and operational effectiveness.

What can I expect when working with Tyler Cybersecurity?

Our services are customized to meet your specific business needs, so we spend a great deal of time during the scoping phase to ensure that we meet your goals and objectives and achieve the desired outcome. We are available throughout the process to answer any questions or address any concerns, even following delivery of the final report and recommendations.

How are your services priced?

Our pricing is typically based on the scope of the work required. Because we customize each engagement to fit your needs, it’s important for us to get an understanding of what they are prior to preparing a proposal.

Learn more!

If you still have questions, please click here to ask our experts!

The Tyler Cybersecurity Lifecycle

Cybersecurity isn’t a destination.

Cybersecurity Lifecycle

There is no single, straight path that will get you to the point where you can say, “We did it! We’re 100% cyber-secure.”

A more realistic destination is cyber resiliency – the ability to prepare for and adapt to changing conditions, so you can withstand and recover rapidly from disruptions. Achieving cyber resilience depends on what we like to call the cybersecurity lifecycle – an ongoing cycle of interconnected elements that compliment and reinforce one another.

Learn More