Operation Vigilant County - Indiana Counties Cybersecurity Training

OPERATION VIGILANT COUNTY

Unite. Defend. Protect.
Empowering Indiana Counties as Cyber Guardians

Unite

Building stronger cybersecurity through collaboration

Defend

Protecting critical infrastructure and data

Protect

Safeguarding communities and public trust

Our Mission

"At Lionfish Cyber Security, our mission is to unite and empower a new generation of Cyber Guardians, standing together to defend our digital world against unseen threats. Through partnership, education, and unwavering commitment, we build resilience and secure the future—leaving no one behind."

By, With, and Through

By Partnership

Working alongside counties to understand unique challenges

With Collaboration

Building capabilities together through shared expertise

Through Empowerment

Enabling long-term success and self-reliance

Lionfish Cyber Security
"Every county official and employee has the potential to become a Cyber Guardian. Our role is to unlock that potential through comprehensive training, ongoing support, and unwavering commitment to excellence."

Jeremy Miller

Founder & CEO, Former Green Beret

Indiana Training Programs

Comprehensive cybersecurity training designed specifically for Indiana counties, ensuring compliance with state requirements while building real-world defensive capabilities.

Elected Officials

8-Hour Leadership Program

Elected officials play a vital role in safeguarding public trust. This program aligns cybersecurity priorities with county missions, ensures compliance, and builds public confidence through transparent leadership.

  • Mission-aligned cybersecurity priorities
  • State and federal compliance requirements
  • Effective resource allocation strategies

All County Employees

8-Hour Comprehensive Program

Every county employee plays a part in protecting sensitive data. This training empowers staff across all departments to recognize risks, follow secure procedures, and contribute to a safer digital environment.

  • Phishing and social engineering defense
  • Secure data handling procedures
  • Proactive threat identification

CIS Framework

40-Hour Intensive

In-depth exploration of CIS Critical Security Controls with practical implementation strategies, assessment tools, and integration with frameworks like NIST, ISO, and CMMC.

  • Prioritized security control implementation
  • Risk assessment and management
  • Continuous improvement programs

NIST AI Risk Management

40-Hour Advanced Program

Navigate the future of AI security with comprehensive training on the NIST AI Risk Management Framework, covering governance, ethics, and technical implementation.

  • AI governance and accountability
  • Bias mitigation and transparency
  • Regulatory compliance strategies

SEA 472 Compliance

8-Hour Indiana Requirements

Indiana-specific training covering SEA 472 cybersecurity requirements for local governments, including policy development, employee training, and mandatory incident reporting.

  • Technology resource use policies
  • Cybersecurity policy implementation
  • Mandatory incident reporting procedures

SEA 459 Water/Wastewater

8-Hour Utility Protection

Critical infrastructure protection for water and wastewater utilities, ensuring compliance with Indiana's SEA 459 requirements while protecting public health and safety.

  • Utility-specific risk assessments
  • Operational security controls
  • Public health protection measures

Weekly Group Sessions

Ongoing Support & Implementation

Transform complex frameworks into manageable, actionable steps through structured weekly sessions. Each 30-60 minute meeting covers 2 specific controls or requirements, followed by real-world implementation in your environment.

CIS Controls

Weekly implementation guidance

NIST AI RMF

Step-by-step framework adoption

SEA 472

Indiana compliance tracking

SEA 459

Utility protection protocols

Program Benefits

  • All sessions recorded and accessible
  • Community collaboration forum
  • Measurable progress tracking
  • Peer support and best practices

Specialized Training Programs

Innovative, role-specific cybersecurity training that goes beyond traditional methods to engage multiple learning modalities and address unique county challenges.

Tailored Training for Every County Role

Specialized cybersecurity awareness training designed for specific county positions

Custom training modules addressing the unique cybersecurity challenges faced by different county roles - from records clerks to department heads, each position gets targeted, relevant training.

Executive Leadership

Strategic cybersecurity training for county executives and department heads

  • Strategic decision making
  • Budget allocation priorities
  • Risk management oversight

Records Clerk

Document security and public records handling protocols

  • Document classification
  • Access control procedures
  • Privacy law compliance

Master Every Framework and Control

Complete compliance awareness training covering every framework and control requirement

In-depth compliance training for all major cybersecurity frameworks, ensuring complete understanding of each control. No gaps, no confusion - just comprehensive mastery.

CIS Control 3.13

Data Protection - Encrypt Sensitive Data at Rest

  • Data encryption standards
  • Key management protocols
  • Compliance verification

CIS Control 1.2

Inventory and Control of Software Assets

  • Software inventory management
  • Authorized software tracking
  • Vulnerability assessment

First-of-Its-Kind Musical Cybersecurity Training

Engaging multiple learning modalities through innovative musical approach

🎵 Industry First Innovation 🎵

Breaking traditional training barriers with catchy, memorable songs that embed cybersecurity concepts directly into long-term memory through rhythm, melody, and repetition.

Revolutionary musical training content for password security - multiple genres available to accommodate different learning styles and preferences.

🔐 Password Security Training

Multiple musical styles teaching password best practices

Rock Style

High-energy password training with rock music

  • Memorable password rules
  • Energetic learning style
Hip Hop Style

Rhythmic password training with hip hop beats

  • Rhythm-based learning
  • Urban-style messaging
Electric Dance

Electronic beats for password security training

  • Electronic engagement
  • Modern appeal

🎭 Social Engineering Awareness

Musical training for recognizing and preventing social engineering attacks

Blues Reggae Style

Smooth rhythms teaching social engineering prevention

  • Recognizing manipulation tactics
  • Building awareness defenses
  • Smooth, memorable messaging

Multiple Learning Styles Supported

Auditory learners
Visual learners
Kinesthetic learners
Social learners

Meet the Mission

Discover how Operation Vigilant County is transforming cybersecurity training for Indiana counties through innovative approaches and unwavering commitment to excellence.

Building Tomorrow's Cyber Guardians

Learn how we're empowering Indiana counties with comprehensive cybersecurity training, compliance support, and innovative educational approaches that leave no one behind.

Join Operation Vigilant County

Ready to become a Cyber Guardian? Take the first step toward protecting your county's digital infrastructure. Our team will work with you to get you plugged in to the training program that meets your compliance requirements.

Immediate Response

Get personalized help within 24 hours

Flexible Scheduling

Training programs that fit your county's schedule

Proven Results

368+ hours of LIVE specialized Indiana training delivered and recorded to see for new hires, refreshers 24/7