X

Start typing and press Enter to search

Services

Experience That Drives Innovation

Security & Risk Management

  • Penetration & Vulnerability Assessments
  • Identification of Key Risk Indicators (KRI)
  • Threat, Vulnerability, Risk Analysis
  • Risk Management Framework (RMF)
  • Risk Assessments and Risk Management
  • Security and Awareness Training
  • Risk-based Enterprise Security Reviews
  • Security Authorization and Accreditation (SA&A)
  • Enterprise Cyber Security Program Assessment
  • Vulnerability Analysis/ Assessments
  • Establishment of Risk Executive Governance
  • Information Assurance

Infrastructure Protection

  • Insider Threat Program Development
  • Counterespionage: Insider Threat Defense
  • Insider Threat Assessment & Risk Mitigation
  • Continuous Monitoring & Threat Modeling
  • Espionage & Counterespionage Mitigation
  • Critical Infrastructure Situational Awareness
  • Aviation Sector Infrastructure Assessments
  • Energy Sector Infrastructure Assessments
  • SCADA Security Reviews

Privacy & Data Protection

  • Audit Log Management
  • Privacy Incident Response
  • Biometric Authentication Implementations
  • Privacy Threshold & Impact Assessments
  • Continuous Monitoring Strategies & Planning
  • Data Protection Architectures and Solutions
  • Identity & Access Management
  • Privacy & Data Protection
  • Logical Access Controls
  • Data Leakage Prevention Solutions
  • HIPAA Security Rule Enforcement

Secure Cloud Services

  • Cloud Advisory
  • Cloud Security Strategy
  • Cloud Identity
  • Cloud Security Assessments
  • Cloud Migration and Management Services
  • FedRAMP Control Pre-Audit Assessments

Business Continuity

  • Business Impact Analysis
  • Contingency Planning
  • Business Continuity Plan (BCP) Development
  • Disaster Recovery (DR) Planning Development
  • Business Recovery
  • Continuity of Operations (COOP) Planning
  • Information System Continuity Planning (ISCP)
  • Backup and Recovery Strategy and Planning

Cyber Training

  • Insider Threat Program Development
  • Critical Infrastructure Situational Awareness
  • Insider Threat Assessment & Risk Mitigation
  • SCADA Security Program Development
  • Espionage & Counterespionage Awareness
  • Risk Management Framework Development

Legal & Compliance

  • Computer Forensics
  • Data Forensics – Recovery & Analysis
  • Security Policy Gap Analysis
  • Contract and Service Level Agreement Reviews
  • Security Policy & Standards
  • Security Procedure Development
  • Security Program Gap Analysis
  • FISMA Reporting and Compliance
  • Formal Report Development

Audit Readiness

  • Security Architecture and Design Review
  • Independent Verification and Validation (IV&V)
  • Security Test and Evaluation (ST&E)
  • Public Sector & Commercial Audit Readiness
  • Daily Stand-up & Out-briefings
  • IT Security (FISCAM) Audit & Audit Readiness
  • Remediation & Corrective Action Planning (CAP)
  • Financial Management Audit & Audit Readiness
  • Documentation of Audit Findings

Continuous Monitoring

  • Incident Management and Response Planning
  • Formation of an Emergency Response Detail
  • Effective Communication Response Plans
  • Evidence Collection and Handling Processes
  • Incident Case Tracking Procedures
  • Incident Investigation Methodologies & Training
  • Incident Investigation Procedures
  • Formation of Incident Response Teams
  • Chain of Custody Procedures

Let us help you gain control of IT Security, Compliance, and Continuity in your business environment!

Contact Us