IT security is one of the most important services solution providers can offer to their clients. Each business struggles with data and network protection concerns. It’s so critical, professionals with this expertise have a greater value and the opportunity to become one of their clients most trusted business partners. While many solution providers have the capability of providing security services, it’s not always easy to communicate the benefits to prospective and current customers.
That’s one benefit of the CompTIA IT Security Trustmark, helping skilled professionals increase their marketability, efficiency and productivity with an industry business credential. Solution providers who receive this designation will have demonstrated the ability to keep their clients’ information safe by following best practices in personnel security, security training and infrastructure.
The CompTIA Security Trustmark credential consists of two levels of validation: associate and verified. At this year’s Breakaway conference in Washington, D.C., a number of solution providers attended a workshop to learn the details of the program and reviewed the application process step-by-step. Lead by Jacob Braun, CompTIA instructor and president and COO of Waka Digital, attendees were asked to work through specific scenarios, completing an extensive review of the sample organization’s security policies. Groups of three or five solution providers reviewed all details of the security control survey. When done for their actual business, they must achieve a passing score. To achieve the verified level, solution providers may have their assessment and business practices put through a rigorous review by an accredited third-party assessor. If they meet the standards, they will receive the higher designation.
The workshop provided attendees with a number of materials, including the security controls for the Trustmark, practice worksheets, a Roadmap Tool (an Excel file) and copies of IT Security Trustmarks. When they do achieve the business accreditation, it opens up a number of promotional opportunities.
What does it take to complete the program? Forty to sixty hours on average, according to Braun, although it may take anywhere from two weeks to a few months depending on the time you have available. The pace is your own, and many solution providers already may be meeting all the requirements. They just need to review and document each. It’s not easy, as two participants at my table shared, but each acknowledged that meant it was of more value to their organizations. By completing the process, they expect to be included in an elite group of IT security professionals.
The accreditation covers 12 areas of security, including: business security policy, business continuity, access management, incident management, personnel security procedures and much more. When you complete the CompTIA Security Trustmark, you’re ready to tell the world about your expertise.
Get Help Attaining the CompTIA Security Trustmark
Email us at blogeditor@comptia.org for inquiries related to contributed articles, link building and other web content needs.
Read More from the CompTIA Blog
Newest on top
Oldest on top