Cybersecurity

Cybersecurity Services

Compliance and Remediation (Become Compliant. Stay Compliant)

  • DIACAP, DIARMF and A&A
    • Direct assistance in identifying, developing, and implementing security controls in support of the Department of Defense (DOD) Information Technology (IT) and DOD Information Assurance Certification and Accreditation (DIACAP) and Risk Management Framework Processes (DIARMF)
    • Development and validation of controls, documents, processes, and other DIACAP/DIARMF required artifacts
    • Development of System Security Plans (SSPs) and any required POAMs
    • DIACAP to RMF transition services
    • Setup and population of eMASS to support required Agency and system-level documentation
    • Assisting Agencies and System Owners to establish reliable transition plans from DIACAP to RMF
    • Supporting achievement of ATOs and recertification actions
  • Enterprise Cybersecurity Planning and Implementation
    • Cybersecurity Planning, budgeting, and program management
    • Enterprise/Joint CND and Cybersecurity programs
    • Compliant CAP and TIC architecture and design
  • NISP and DSS
    • Secure Facility design, setup and maintenance
    • Security procedures baselines and program optimization
    • Audit and agency inspection preparation
  • Compliance Programs
    • End-user training and security compliance
    • Personnel Security Program planning and implementation
    • Facility Security Officer tools and techniques training

Architecture and Optimization (Manage change today. Optimize for Tomorrow)

  • Network Re-engineering and Design
    • Secure Enclaves/DMZs
    • Cloud Access Points
    • Network Resilience
    • Joint Security Modeling
    • Path Diversity
  • Network Performance Analysis and Optimization
    • Network traffic analysis
    • Automated zero-day exploit containment
    • Malware/Rogue System detection and isolation
    • Logging, Event Analysis, and Network Event Correlation
    • Deep packet inspection
  • Multi-Level Network Security
    • DoD-approved network tunneling and encapsulation architectures
    • Encryptors, key management, SSL Termination
    • COMSEC Management
  • Secure Wireless Integration
  • Wireless surveys, troubleshooting, and upgrades
  • Design, deployment, and configuration of STIG-compliant wireless networks
  • Application of existing authentication mechanisms into wireless networks
  • Seamless integration of wireless capabilities into existing wired environments
  • Training and transition support services

Risk Management (Managing Risk in a complex world)

  • Full-scope Cybersecurity Risk Framework
    • Operational Lifecycle oversight and governance
    • Organizational and portfolio Transformations
    • Enterprise Compliancy models and tools
  • Critical Infrastructure and Mission Assurance
    • DoD PDD-63 compliance
    • DoD CIP Lifecycle support
    • Mission-essential function policy and program support
  • Security Operations and Incident Response
    • Security Operations Center design and implementation
    • Security operations tool selection, configuration and optimization
    • Tier 2 and Tier 3 Computer Network Defense programs
  • Business Continuity
    • BCM program creation and assessments
    • Enterprise Risk Management
    • NIST 800-34 Compliance

IT Initiatives (Design, deploy, and maintain new IT)

  • Secure Enterprise
  • Secure Mobile
  • Secure Data
  • Secure Collaboration

Cloud-based Solutions (Leverage approved cloud capabilities)

  • Compliant FedRAMP Solutions
  • Office 365
  • Navigating SCCA, SRG, and CAPs

Professional Services (Demonstrated Experience. Proven Results)

  • Cyber Risk and Compliance Assessments
  • Network Architecture Assessments
  • Governance and Program Development
  • Residency Programs
  • Service Management
  • Vulnerability assessments