Cybersecurity Governance

  • Comprehensive cyber security strategy
  • Governing security policies
  • Standards-ensuring procedures and guidelines comply with policies
  • Institutionalized metrics and monitoring processes

Information Risk Management (IRM)

  • Risk management strategies
  • Risk assessment
  • Risk treatment
  • Acceptance of residual risk
  • Risk communication and continuous monitoring (strategies)
  • POAM Reviews

Risk Management Framework (RMF)

  • Systems categorization
  • Security authorization packages
  • Security controls implementation
  • Risk assessment reports (RAR)
  • POAM validation
  • Change Management & Configuration Review Board (CM&CCB)
  • FISMA Compliance & Reporting

Cloud Computing & Security

  • Security documentation development
  • Deliverables and security identification
  • Data-in-transit
  • Data-at rest
  • Data integrity
  • DevOps pipeline security
  • Risk assessments
  • Security controls implementation
  • Cell level security

Software and Application Security

  • Mobile code analysis and reviews
  • Malicious code analysis and reviews
  • Code analysis and reviews
  • Security controls implementations
  • Risk assessments & mitigation
  • Scans
  • POAM

Continuity of Operations (COOP) & Disaster Recovery

  • FedRAMP compliance
  • Identify Mission Essential Functions
  • Development of Continuity Plans
  • Business Impact Assessments (BIA)
  • Identify preventive controls
  • Develop Recovery Strategies
  • Conduct Site Surveys
  • Exercises & Test drills

© 2011-2017 DATechNet.com, All Rights Reserved.
Managed by: CWDOT4.com