Security & Risk ManagementInfrastructure ProtectionPrivacy & Data ProtectionSecure Cloud ServicesBusiness ContinuityCyber TrainingLegal and ComplianceAudit ReadinessContinuous MonitoringERP
Security & Risk Management
- Penetration & Vulnerability Assessments
- Threat, Vulnerability, Risk Analysis
- Risk Assessments and Risk Management
- Risk-based Enterprise Security Reviews
- Enterprise Cyber Security Program Assessment
- Establishment of Risk Executive Governance
- Identification of Key Risk Indicators (KRI)
- Risk Management Framework (RMF)
- Security and Awareness Training
- Security Authorization and Accreditation (SA&A)
- Vulnerability Analysis/ Assessments
- Information Assurance
Infrastructure Protection
- Insider Threat Program Development
- Insider Threat Assessment & Risk Mitigation
- Espionage & Counterespionage Mitigation
- Aviation Sector Infrastructure Assessments
- SCADA Security Reviews
- Counterespionage: Insider Threat Defense
- Continuous Monitoring & Threat Modeling
- Critical Infrastructure Situational Awareness
- Energy Sector Infrastructure Assessments
Privacy & Data Protection
- Audit Log Management
- Biometric Authentication Implementations
- Continuous Monitoring Strategies & Planning
- Identity & Access Management
- Logical Access Controls
- HIPAA Security Rule Enforcement
- Privacy Incident Response
- Privacy Threshold & Impact Assessments
- Data Protection Architectures and Solutions
- Privacy & Data Protection
- Data Leakage Prevention Solutions
Secure Cloud Services
- Cloud Advisory
- Cloud Security Strategy
- Cloud Identity
- Cloud Security Assessments
- Cloud Migration and Management Services
- FedRAMP Control Pre-Audit Assessments
Business Continuity
- Business Impact Analysis
- Contingency Planning
- Business Continuity Plan (BCP) Development
- Disaster Recovery (DR) Planning Development
- Business Recovery
- Continuity of Operations (COOP) Planning
- Information System Continuity Planning (ISCP)
- Backup and Recovery Strategy and Planning
Legal & Compliance
- Computer Forensics
- Data Forensics – Recovery & Analysis
- Security Policy Gap Analysis
- Contract and Service Level Agreement Reviews
- Security Policy & Standards
- Security Procedure Development
- Security Program Gap Analysis
- FISMA Reporting and Compliance
- Formal Report Development
Audit Readiness
- Security Architecture and Design Review
- Independent Verification and Validation (IV&V)
- Security Test and Evaluation (ST&E)
- Public Sector & Commercial Audit Readiness
- Daily Stand-up & Out-briefings
- IT Security (FISCAM) Audit & Audit Readiness
- Remediation & Corrective Action Planning (CAP)
- Financial Management Audit & Audit Readiness
- Documentation of Audit Findings
Continuous Monitoring
- Incident Management and Response Planning
- Formation of an Emergency Response Detail
- Effective Communication Response Plans
- Evidence Collection and Handling Processes
- Incident Case Tracking Procedures
- Incident Investigation Methodologies & Training
- Incident Investigation Procedures
- Formation of Incident Response Teams
- Chain of Custody Procedures
ERP
- ERP Package Implementations (SAP – ECC, BI, SRM, CRM, PLM, EWM etc.), Oracle, Peoplesoft, Seibel etc.
- A full life cycle ERP implementation
- Business Intelligence Solutions (SAP BW/BI/BO, Cognos, Informatica etc.)
- Custom Software Application Development (SAP ABAP, WebDynpro, Java, .Net, C, C++)
- Governance, Risk, and Compliance (GRC)
- Information Technology Consulting
- Package Solutions Implementations (COTS)
- Operational Improvements through Business Process enhancements by incorporating a Continuous Monitoring Program (CMP) in processes.