Phone : (703) 906-7765
Security and Risk Management
- Penetration and Vulnerability Assessments
- Identification of Key Risk Indicators (KRI)
- Threat, Vulnerability, and Risk Analyses
- Risk Management Framework (RMF)
- Risk Assessments and Risk Management
- Security and Awareness Training
- Risk-Based Enterprise Security Reviews
- Security Authorization and Accreditation (SA&A)
- Enterprise Cybersecurity Program Assessments
- Vulnerability Analyses/Assessments
- Establishment of Risk Executive Governance
- Information Assurance
Infrastructure Protection
- Insider Threat Program Development
- Counterespionage: Insider Threat Defense
- Insider Threat Assessments and Risk Mitigation
- Continuous Monitoring and Threat Modeling
- Espionage and Counterespionage Mitigation
- Critical Infrastructure Situational Awareness
- Aviation Sector Infrastructure Assessments
- Energy Sector Infrastructure Assessments
- SCADA Security Reviews
Privacy and Data Protection
- Audit Log Management
- Privacy Incident Response
- Biometric Authentication Implementations
- Privacy Threshold and Impact Assessments
- Continuous Monitoring Strategies and Planning
- Data Protection Architectures and Solutions
- Identity and Access Management
- Privacy and Data Protection
- Logical Access Controls
- Data Leakage Prevention Solutions
- HIPAA Security Rule Enforcement
Secure Cloud Services
- Cloud Advisory
- Cloud Security Strategies
- Cloud Identity
- Cloud Security Assessments
- Cloud Migration and Management Services
- FedRAMP Control Pre-Audit Assessments
Business Continuity
- Business Impact Analysis
- Contingency Planning
- Business Continuity Plan (BCP) Development
- Disaster Recovery (DR) Planning Development
- Business Recovery
- Continuity of Operations (COOP) Planning
- Information System Continuity Planning (ISCP)
- Backup and Recovery Strategy and Planning
Cyber Training
- Insider Threat Program Development
- Critical Infrastructure Situational Awareness
- Insider Threat Assessment and Risk Mitigation
- SCADA Security Program Development
- Espionage and Counterespionage Awareness
- Risk Management Framework Development
Legal and Compliance
- Computer Forensics
- Data Forensics – Recovery and Analyses
- Security Policy Gap Analyses
- Contract and Service Level Agreement Reviews
- Security Policy and Standards
- Security Procedure Development
- Security Program Gap Analyses
- FISMA Reporting and Compliance
- Formal Report Development
Audit Readiness
- Security Architecture and Design Reviews
- Independent Verification and Validation (IV&V)
- Security Test and Evaluation (ST&E)
- Public Sector and Commercial Audit Readiness
- Daily Stand-Up and Out-Briefings
- IT Security (FISCAM) Audit and Audit Readiness
- Remediation and Corrective Action Planning (CAP)
- Financial Management Audit and Audit Readiness
- Documentation of Audit Findings
Continuous Monitoring
- Incident Management and Response Planning
- Formation of an Emergency Response Detail
- Effective Communication Response Plans
- Evidence Collection and Handling Processes
- Incident Case Tracking Procedures
- Incident Investigation Methodologies and Training
- Incident Investigation Procedures
- Formation of Incident Response Teams
- Chain of Custody Procedures
ERP
- ERP package implementations (SAP – ECC, BI, SRM, CRM, PLM, EWM, etc.), Oracle, Peoplesoft, Seibel, Etc.
- Full life cycle ERP implementations
- Business Intelligence solutions (SAP BW/BI/BO, Cognos, Informatica, etc.)
- Custom software application development (SAP ABAP, WebDynpro, Java, .Net, C, C++)
- Governance, risk, and compliance (GRC)
- Information technology consulting
- Package solution implementations (COTS)
- Operational improvements through business process enhancements by incorporating a continuous monitoring program (CMP) in processes