• Certification and Accreditation support
  • Independent Verification and Validation
  • Cyber Security policy review and formulation
  • Disaster planning and continuity of operations (COOP) planning
  • Log and event management
  • Data loss prevention
  • Vulnerability identification and remediation
  • Security incident alert and response
  • Cyber role-based training
  • Information system security engineering
  • Enterprise cyber risk management
  • Continuous monitoring
  • Ongoing Authorization