Supply Chain Threats

-
Virtual CISO
Virtual CISO, for strategy, consulting, leadership. Billed by the hour, one to 40 hours per week.
Discount: Billed per hour at $350

-
Insurance Requirement Extraction Service
This one time service is for customers who do not have a documented or standard set of third party insurance requirements. Delivered through this service, our team will review all third party contracts and configure third party insurance requirements as granularly as needed, even so far as to... Show MoreDiscount: 20%
-
Insurance Verification Managed Service:
This is our white-glove, fully managed subscription service that clients can select as a part of their configuration in order to fully remove administrative burden and mitigate the risk of employees with institutional knowledge leaving the municipality.
Discount: 20%
-
Insurance Verification-as-a-Service (IVaaS):
This is our subscription service that customers purchase to automate the collection and verification of third party insurance. Customers purchase one license per third party to be monitored.
Discount: 20%
-
Paid Onboarding Service
This one time service provides each customer with a dedicated Customer Success representative who will perform the work to configure the system requirements, populate the third party records, and perform all of the associated onboarding and implementation tasks for the customer. They will als... Show MoreDiscount: 20%

ProCircular is a people-first cybersecurity company focusing uniquely on the careful balance between relationships and technical expertise. Our team offers a comprehensive suite of services tailored to help organizations manage risk and proactively navigate the ever-evolving landscape of cybersecurity challenges. We approach every service to safeguard our clients and their vital data, all while fostering trust-based relationships that underpin a resilient cybersecurity posture.
-
Virtual Chief Information Security Officer (vCISO)
Supports and augments your security, risk, compliance, and privacy programs.
Design, implement, and manage the various elements of your security, risk, compliance, and privacy programs.

At SENTRICUS, our mission is to safeguard organizations against cyber threats and ensure adherence to industry regulations through comprehensive information security solutions. We are the trusted partner for businesses, providing expert guidance, cutting-edge technology, and robust risk management strategies.
-
Governance, Risk & Compliance
Streamline and strengthen your organization’s governance and compliance efforts with comprehensive documentation, privacy strategies, and business continuity planning.
We ensure alignment with regulatory requirements to minimize risk and maintain operational resilience. -
vCISO & CISO Support
Empower your organization with strategic and operational cybersecurity leadership.
Our vCISO services help build and sustain robust security programs, providing expert guidance and ongoing management tailored to your needs.Discount: 10%
-
Unified Cyber Resiliency Platform
Cybersecurity | GRC | ComplianceOps Protection from Device to the Cloud Our eGRC platform continuously measures, quantifies, and monitors risk. Provides: 1. Advanced real-time visibility 2. AI powered threat defense, and 3. Risk identification across the threat landscape: IT, OT, IoT, Network... Show MoreDiscount: 10%
-
Cybersecurity Posture Assessments
Gain actionable insights into your organization’s security maturity with assessments aligned to leading frameworks like the NIST CSF, the CIS Top 18, and ISO/IEC 27001. We also provide specialized readiness evaluations for CJIS, CMMC, and anti-fraud measures to enhance compliance and reduce... Show MoreDiscount: 10%

-
vCISO Advisory
A Chief Information Security Officer (CISO) is essential for leading an organization’s cybersecurity strategy, ensuring that the right protections are in place and managing risks effectively. However, not every organization requires or can afford a full-time CISO. PNG Cyber offers Virtual C... Show More -
Tabletop Exercises
We offer a variety of tailored tabletop exercises. For example, we can provide an incident response planning tabletop tailored for a management or a technical audience. Our experts will host relevant and timely scenarios designed to be intense collaborative learning experiences aimed at testi... Show MoreDiscount: 25%
-
Cyber Posture Assessment
Our Cyber Posture Assessment evaluates your organization’s security measures, identifies vulnerabilities, and provides actionable insights. We review policies, practices, and infrastructure, using vulnerability scans and simulated attacks to uncover weaknesses. Our assessment ensures compli... Show MoreDiscount: 24%
-
End User Awareness and Training
PNG Cyber offers a comprehensive End User Awareness and Training service to educate your employees, reduce their vulnerability to attacks, and create a security-conscious culture across your organization.