Cybersecurity Governance
- Comprehensive cyber security strategy
- Governing security policies
- Standards-ensuring procedures and guidelines comply with policies
- Institutionalized metrics and monitoring processes
Information Risk Management (IRM)
- Risk management strategies
- Risk assessment
- Risk treatment
- Acceptance of residual risk
- Risk communication and continuous monitoring (strategies)
- POAM Reviews
Risk Management Framework (RMF)
- Systems categorization
- Security authorization packages
- Security controls implementation
- Risk assessment reports (RAR)
- POAM validation
- Change Management & Configuration Review Board (CM&CCB)
- FISMA Compliance & Reporting
Cloud Computing & Security
- Security documentation development
- Deliverables and security identification
- Data-in-transit
- Data-at rest
- Data integrity
- DevOps pipeline security
- Risk assessments
- Security controls implementation
- Cell level security
Software and Application Security
- Mobile code analysis and reviews
- Malicious code analysis and reviews
- Code analysis and reviews
- Security controls implementations
- Risk assessments & mitigation
- Scans
- POAM
Continuity of Operations (COOP) & Disaster Recovery
- FedRAMP compliance
- Identify Mission Essential Functions
- Development of Continuity Plans
- Business Impact Assessments (BIA)
- Identify preventive controls
- Develop Recovery Strategies
- Conduct Site Surveys
- Exercises & Test drills
© 2011-2017 DATechNet.com, All Rights Reserved.
Managed by:
CWDOT4.com