Information Warfare is a critical concern for the Fleet and partnering with us delivers the resources to provide multiple layers of active protection of our clients’ networks and the sensitive information included therein. Our active cyber defense services include:
Cypher Analytics engineers execute network vulnerability assessments such as Assured Compliance Assessment Solution (ACAS) to identify and remediate security flaws. We gather and evaluate system requirements including cybersecurity controls, to ensure compliance with all applicable security guidance. By remaining at the forefront of cybersecurity, we ensure our clients’ networks are protected against constantly-evolving threats.
We support all aspects of RMF and DIACAP-to RMF efforts, including creating and submitting inputs to RMF packages. Our expertise with these rigorous activities lends itself well to the ever-increasing focus on a system’s security posture.
To manage the review and implementation of security mandates such as STIGs, CTOs, TASKORDs, and IAVAs/Bs, we create and maintain a requirements traceability matrix (RTM). As mandates are published by agencies such as Defense Information Systems Agency (DISA) and the National Institute of Standards & Technology (NIST), each is added to the RTM and tracked from initial evaluation efforts to formal fielding on production networks