Security and Risk Management

  • Penetration and Vulnerability Assessments
  • Identification of Key Risk Indicators (KRI)
  • Threat, Vulnerability, and Risk Analyses
  • Risk Management Framework (RMF)
  • Risk Assessments and Risk Management
  • Security and Awareness Training
  • Risk-Based Enterprise Security Reviews 
  • Security Authorization and Accreditation (SA&A) 
  • Enterprise Cybersecurity Program Assessments 
  • Vulnerability Analyses/Assessments 
  • Establishment of Risk Executive Governance 
  • Information Assurance 

Infrastructure Protection

  • Insider Threat Program Development 
  • Counterespionage: Insider Threat Defense 
  • Insider Threat Assessments and Risk Mitigation 
  • Continuous Monitoring and Threat Modeling 
  • Espionage and Counterespionage Mitigation 
  • Critical Infrastructure Situational Awareness 
  • Aviation Sector Infrastructure Assessments 
  • Energy Sector Infrastructure Assessments 
  • SCADA Security Reviews 

Privacy and Data Protection

  • Audit Log Management 
  • Privacy Incident Response 
  • Biometric Authentication Implementations 
  • Privacy Threshold and Impact Assessments 
  • Continuous Monitoring Strategies and Planning 
  • Data Protection Architectures and Solutions 
  • Identity and Access Management 
  • Privacy and Data Protection 
  • Logical Access Controls 
  • Data Leakage Prevention Solutions 
  • HIPAA Security Rule Enforcement 

Secure Cloud Services

  • Cloud Advisory 
  • Cloud Security Strategies 
  • Cloud Identity 
  • Cloud Security Assessments 
  • Cloud Migration and Management Services 
  • FedRAMP Control Pre-Audit Assessments 

Business Continuity

  • Business Impact Analysis 
  • Contingency Planning 
  • Business Continuity Plan (BCP) Development 
  • Disaster Recovery (DR) Planning Development 
  • Business Recovery 
  • Continuity of Operations (COOP) Planning 
  • Information System Continuity Planning (ISCP) 
  • Backup and Recovery Strategy and Planning 

Cyber Training

  • Insider Threat Program Development 
  • Critical Infrastructure Situational Awareness 
  • Insider Threat Assessment and Risk Mitigation 
  • SCADA Security Program Development 
  • Espionage and Counterespionage Awareness 
  • Risk Management Framework Development 

Audit Readiness

  • Security Architecture and Design Reviews 
  • Independent Verification and Validation (IV&V) 
  • Security Test and Evaluation (ST&E) 
  • Public Sector and Commercial Audit Readiness 
  • Daily Stand-Up and Out-Briefings 
  • IT Security (FISCAM) Audit and Audit Readiness 
  • Remediation and Corrective Action Planning (CAP) 
  • Financial Management Audit and Audit Readiness 
  • Documentation of Audit Findings 

Continuous Monitoring

  • Incident Management and Response Planning 
  • Formation of an Emergency Response Detail 
  • Effective Communication Response Plans 
  • Evidence Collection and Handling Processes 
  • Incident Case Tracking Procedures 
  • Incident Investigation Methodologies and Training 
  • Incident Investigation Procedures 
  • Formation of Incident Response Teams 
  • Chain of Custody Procedures 

ERP

  • ERP package implementations (SAP – ECC, BI, SRM, CRM, PLM, EWM, etc.), Oracle, Peoplesoft, Seibel, Etc. 
  • Full life cycle ERP implementations 
  • Business Intelligence solutions (SAP BW/BI/BO, Cognos, Informatica, etc.) 
  • Custom software application development (SAP ABAP, WebDynpro, Java, .Net, C, C++) 
  • Governance, risk, and compliance (GRC) 
  • Information technology consulting
  • Package solution implementations (COTS) 
  • Operational improvements through business process enhancements by incorporating a continuous monitoring program (CMP) in processes