Security Access, Audit & Administration
-
Information Assurance Policies and Procedures
-
Identity and Access Management
- Authentication; Authorization; Roles; Delegation; Interchange
-
Cybersecurity framework
Cybersecurity & Network Operations
-
NOC/SOC Support Services
- CONOPS; Monitor; Assess; Defend
-
CloudSOC
-
Incident Management
-
Forensics
Security Threat Analysis & Data Protection
-
Endpoint Detection and Response
- Monitor Endpoint and Network Events; External and Insider Database of Threats; Detection; Investigation; Analytics; Reporting; Alerting
-
Network Traffic Analysis
- Real-time Network Data Analysis; Complete Transaction Visibility; Decrypt Traffic for Analysis; Baselining and Anomaly Detection; Deploying Network Traffic Analyzer; Deception Technologies and Techniques
-
OSS Security Scanning and Software Composition Analysis
- Open Source Audit; Threat Identification; Code; Files
-
Vulnerability Scan, Penetration Test, and Analysis
- Identify Weaknesses; Review Security Policies and Procedures; Design; Implementation; Controls; Host, Network and database; Active and Passive; Distributed
-
Application and Database Security
- Encryption Strategies; Enterprise user Management; Privelages, Roles and Schemas
-
Insider Threat Analysis
-
Data Governance
Mobile Security
-
Device
- Access protection and Encryption, Virus Protection & Training
-
Data
- Impact Assessment and Device Discovery, Encryption & Identity Management
-
Incident Management
-
Forensics
-
Cloud utilization
- Cloud storage, backup & disaster recovery
Project Management Security
-
Planning and Tracking
-
Establishing and Enforcing Network Security Policies and Procedures
-
Opportunity and Risk Identification
-
Regulating Access to Information
-
Implementing Security Measures
-
Training
-
Reporting and Deliverables
Security & Risk Management Framework
-
Identifying Risks
-
Prioritizing Risks
-
Mitigating Risks
-
Aligning Risks and Strategy
-
Cybersecurity Hygiene Training
Regulatory Compliance Assessment
-
Security Controls Assessment & Validation
-
Remediation
-
Authority to Operate
-
GDPR – General Data Protection Regulation
-
FCPA – Foreign Corrupt Practices Act
-
ITAR – International Traffic in Arms Regulations
-
FISMA – The Federal Information Security Management Act
-
FICAM – Federal Identity, Credential, and Access Management Architecture
-
FIPS – Federal Information Processing Standards – 199/200
Big Data
-
Cloud
-
Protection / Data Security
-
Encryption
-
Backup and Restore
-
De-duplication
-
Optimized Performance and Storage
-
Data Visualization
-
Data Analysis
IT Program Management
-
Governance
- Roles, Responsibilities, Oversight
-
Management
-
Financial Management
- Fiscal Practices, Controls
-
Infrastructure
- Program Office, Technology, Roles, Tools, Practices
-
Planning
- Multi-level Activities, Goals