Services

Security & Risk ManagementInfrastructure ProtectionPrivacy & Data ProtectionSecure Cloud ServicesBusiness ContinuityCyber TrainingLegal and ComplianceAudit ReadinessContinuous MonitoringERP

Security & Risk Management

  • Penetration & Vulnerability Assessments
  • Threat, Vulnerability, Risk Analysis
  • Risk Assessments and Risk Management
  • Risk-based Enterprise Security Reviews
  • Enterprise Cyber Security Program Assessment
  • Establishment of Risk Executive Governance
  • Identification of Key Risk Indicators (KRI)
  • Risk Management Framework (RMF)
  • Security and Awareness Training
  • Security Authorization and Accreditation (SA&A)
  • Vulnerability Analysis/ Assessments
  • Information Assurance

Infrastructure Protection

  • Insider Threat Program Development
  • Insider Threat Assessment & Risk Mitigation
  • Espionage & Counterespionage Mitigation
  • Aviation Sector Infrastructure Assessments
  • SCADA Security Reviews
  • Counterespionage: Insider Threat Defense
  • Continuous Monitoring & Threat Modeling
  • Critical Infrastructure Situational Awareness
  • Energy Sector Infrastructure Assessments

Privacy & Data Protection

  • Audit Log Management
  • Biometric Authentication Implementations
  • Continuous Monitoring Strategies & Planning
  • Identity & Access Management
  • Logical Access Controls
  • HIPAA Security Rule Enforcement
  • Privacy Incident Response
  • Privacy Threshold & Impact Assessments
  • Data Protection Architectures and Solutions
  • Privacy & Data Protection
  • Data Leakage Prevention Solutions

Secure Cloud Services

  • Cloud Advisory
  • Cloud Security Strategy
  • Cloud Identity
  • Cloud Security Assessments
  • Cloud Migration and Management Services
  • FedRAMP Control Pre-Audit Assessments

Business Continuity

  • Business Impact Analysis
  • Contingency Planning
  • Business Continuity Plan (BCP) Development
  • Disaster Recovery (DR) Planning Development
  • Business Recovery
  • Continuity of Operations (COOP) Planning
  • Information System Continuity Planning (ISCP)
  • Backup and Recovery Strategy and Planning

Legal & Compliance

  • Computer Forensics
  • Data Forensics – Recovery & Analysis
  • Security Policy Gap Analysis
  • Contract and Service Level Agreement Reviews
  • Security Policy & Standards
  • Security Procedure Development
  • Security Program Gap Analysis
  • FISMA Reporting and Compliance
  • Formal Report Development

Audit Readiness

  • Security Architecture and Design Review
  • Independent Verification and Validation (IV&V)
  • Security Test and Evaluation (ST&E)
  • Public Sector & Commercial Audit Readiness
  • Daily Stand-up & Out-briefings
  • IT Security (FISCAM) Audit & Audit Readiness
  • Remediation & Corrective Action Planning (CAP)
  • Financial Management Audit & Audit Readiness
  • Documentation of Audit Findings

Continuous Monitoring

  • Incident Management and Response Planning
  • Formation of an Emergency Response Detail
  • Effective Communication Response Plans
  • Evidence Collection and Handling Processes
  • Incident Case Tracking Procedures
  • Incident Investigation Methodologies & Training
  • Incident Investigation Procedures
  • Formation of Incident Response Teams
  • Chain of Custody Procedures

ERP

  • ERP Package Implementations (SAP – ECC, BI, SRM, CRM, PLM, EWM etc.), Oracle, Peoplesoft, Seibel etc.
  • A full life cycle ERP implementation
  • Business Intelligence Solutions (SAP BW/BI/BO, Cognos, Informatica etc.)
  • Custom Software Application Development (SAP ABAP, WebDynpro, Java, .Net, C, C++)
  • Governance, Risk, and Compliance (GRC)
  • Information Technology Consulting
  • Package Solutions Implementations (COTS)
  • Operational Improvements through Business Process enhancements by incorporating a Continuous Monitoring Program (CMP) in processes.