Cyber Security and Information Assurance (IA)
Cybersecurity is a dynamic field. Technologies change, threats evolve, vulnerabilities abound, and security professionals and their solutions must constantly adapt. Most companies and/or agencies have a core business or businesses in areas other than cybersecurity, which may lead to challenges when the rate of cybersecurity changes and the complexity of cyber security solutions exceeds the capacity of the company/agency IT staff to support. Allied Mission Group’s cybersecurity experts can help our customers in many ways. We offer a range of services and capabilities from common cybersecurity service offerings to complete turn-key solutions and/or solution development.
Our Cyber Security service offerings include:
Technical Reference Model (TRM) development, Vulnerability Assessments, and Compliance Management and Validation
Manage Technical Reference Model (TRM) development and maintenance to support enterprise-wide hardware and software, as well as support business and infrastructure applications and services
Conduct Products List Assessment Task (PLAT) analysis and cyber security breach vulnerability assessments across Enterprise TRM
Establish best practices for evaluating security compliance for non standard products in the TRM such as mobile applications and open source
Application Vulnerability Scanning and Data Analytics
Leverage best of breed Cyber Security tools such as Nessus, Splunk, Fortify, ArcSight CyberArk, SailPoint and McAfee to validate systems and applications against security requirements and identify potential risks and vulnerabilities.
Leverage tools such as Kryptowire to analyze mobile applications against security requirements and priorities
Support discovery and audit solutions to help organizations identify security risks by scanning and analyzing privileged accounts across their networks
Security Life-Cycle Management, POA&M management, Compliance Management, and Authorization & Accreditation (A&A) management and support
Provide security advisory and cyber security best practices to integrate key security design methodologies and principles, review of new and existing systems, and software, hardware, and networks for potential security vulnerabilities.
Provide support of developing, maintaining, and updating security, contingency, and configuration management plans documents
Ensure network, and system level comply with industry standards such as NIST, FISMA, FIPS, NIACAP, DIACAP, DHS 4300, CBP 1400-05D as well as other agency level security requirements to include Presidential mandates and federal cyber security initiatives and alerts
Provide end to end life-cycle security program support to include the development and updates to security plans, security assessments, contingency plan management, security gate reviews, Authority to Operate (ATO) requirements, POA&M management, operational readiness assessments, maintaining system authorization status and continuous monitoring.
ISSO, ISSE, and ISSM Services and Support
SCA Services and Support
ATO package creation, review, and/or submission
Security Audit support
Continuous Diagnostic Monitoring and Management support
If you’d like to learn about partnering with AMG to serve your Cyber Security requirements, please reach out to Lou Lindsay, Senior Director, Cyber Security start the conversation!