Cybersecurity Risk Management for PLAN JPA Members
- Home
- Cybersecurity Risk Management for PLAN JPA Members

Free Resource Provided by PLAN JPA to improve Cybersecurity Best Practices
Enterprise-Grade Cybersecurity for PLAN JPA members—Without the Complexity or Cost.
In today’s digital landscape, a proactive approach to Cybersecurity Risk Management is not just important – it’s essential. PLAN JPA has partnered with ResoluteGuard to help you protect your data and systems.
You’ll Receive Tailored Assessments and Vulnerability Scans to Identify Vulnerabilities Specific to Local Governments:
External Vulnerability Scans including Public-facing IP’s
External vulnerability scans are automated assessments performed from outside your network to identify security gaps in your public-facing systems. These scans simulate the actions of a potential attacker trying to breach your perimeter defenses, giving you an outside-in view of your security posture.
Penetration Testing (External 2 times Annually)
Automatic penetration testing, also known as automated pen testing, is a critical security measure for public entities. It involves using automated tools to simulate cyberattacks on to identify vulnerabilities and assess the effectiveness of your security measures.
Comprehensive Vulnerability Scans (Internal Network & External) 4 times Annually
Comprehensive External AND Internal Network vulnerability scans to identify potential security risks. These scans detect and address vulnerabilities before they can be exploited, ensuring a stronger security posture.
Protect with Confidence
ResoluteGuard's vCISOSecure is a unique cybersecurity risk management platform built specifically with municipalities in mind.
It empowers administrators and technology teams with the tools to manage cyber risk strategy, planning, and implementation—efficiently and effectively.
SMART-Cyber Action Plan: Your Roadmap to Security
Partner with your dedicated cybersecurity advisory to help you craft your SMART-Cyber Action Plan, a step-by-step roadmap tailored to your needs and budget.
Using vCISOSecure Risk Scores as a baseline, you can build a customized plan to identify, mitigate, and manage risks.
- Pinpoint Gaps: Address weaknesses reflected in your risk scores.
- Align Resources: Customize your plan to fit governance, admin, and tech priorities.
- Track Progress: Real-time updates on tasks and risk scores keep you on target.


Cyber Risk Dashboard: See Your Progress
The Cybersecurity Risk Dashboard delivers clear risk scores to measure the maturity of your cybersecurity practices and track progress toward your goals.
Stay Informed, Stay Secure
- Monthly Executive Summary: Get a clear snapshot of your cybersecurity posture, risks, and statuses—perfect for bridging communication between administration and IT.
- Risk Management Reporting Suite: Access detailed reports like Cyber Risk Scores, Cyber Insurance Reports, and Budget insights for smarter decision-making.
- Automatic Notifications: Stay updated on task statuses in real-time, boosting transparency and awareness.
Budget with Confidence
vCISOSecure equips you to collaborate with your finance team, prioritizing funds to protect digital assets, strengthen defenses, and mitigate threats—ensuring every dollar counts.

As with any critical process, our first step is meeting to understand your, people, goals, objectives, and priorities. This call is an opportunity for the Executive Leadership and IT Team to meet with ResoluteGuard’s Cyber Risk Coordinator and ensure their mission and goals align to support their plan/strategies. ResoluteGuard’s Cyber Risk Coordinators obtain the information needed to assess technical gaps and risks and update the members’ SMART- Cyber Action Plan.
Program Overview Call
60 Minutes

The Cyber Risk Assessment includes vulnerability scans. These scans help to identify risks such as Common Vulnerabilities and Exposures (CVEs), server misconfigurations, and sensitive data exposures, all of which provide ResoluteGuard and the member with the information essential to developing their Cybersecurity strategy.
Scan Activation Call
30 Minutes

Internal Network and External Vulnerability Scan Reports include a description of Risk findings, recommendations and remedial actions. It prioritizes highest risks by severity and probability. The cyber risk assessment has great value when it provides actionable steps to remediate issues. Several Reports including network documentation (Assets, Users, application inventories, and more) are provided.
Report Review Call
60 Minutes

Additional Services Available at discounted fees for Plan members:
Multi-factor Authentication (MFA) – extra layer of security to the authentication process.
Endpoint Detection & Response (EDR) – protect devices such as desktops, laptops, tablets, smartphones, and servers from various cyber threats.
Managed SOC – 24/7/365 monitoring of your network and alert you of potential cyber risks.
Remote Monitoring & Management (RMM)– RMM software allows IT administrators to remotely monitor device health, performance, and security status in real-time. It enables tasks such as software deployment, patch management, system updates, troubleshooting, and remote desktop support.
Mobile Device Management (MDM)– MDM software allows IT administrators to enforce security policies, configure device settings, deploy applications, and remotely manage mobile devices from a centralized console.
Employee Video and Email Phishing Training – simulated phishing campaigns to increase employee awareness.
Backup & Recovery – ensure data protection, business continuity, and compliance with regulations.
Third Party Risk Management – safeguard against potential risks that arise from partner/vendor/supplier engagement.
Email Security – Email security provides proactive defense mechanisms to prevent attacks before they can cause significant damage.
Want to Learn More?

Email a Cyber Specialist
Speak with a ResoluteGuard specialist to learn how you can improve your cybersecurity posture.

Schedule a Call
Learn in real-time how ResoluteGuard can provide cybersecurity protection.

Give Us a Call!
Can’t wait to speak with us? Give us a call directly to learn how we can improve your cybersecurity posture.