Cyber Intelligence
Consulting Services

cyber-glasses-680

Professional Services: Expertise to Protect Your Business

Professional Services encompass a wide range of consulting, staff augmentation, and turnkey operations including:

  • Security Plans, Policies & Procedures to implement, monitor and manage security operations and assets
  • Disaster Response and Business Continuity services to validate existing plans
  • Compliance Assessment for industry standards and NIST best practices
  • Security Risk Assessment of policies, procedures and current cyber security posture
  • Security Architecture: a layered, adaptable environment for information technology, networks, and communications systems
  • Penetration Testing to identify real-world vulnerabilities and provide a prioritized list of recommended actions
  • Cyber Resiliency Roadmaps to evolve your organization’s security into a more intelligence-driven defense
  • Supply Chain Security and Secure Code Review: an audit of policies, processes and controls to avoid vulnerabilities from vendors
  • Forensics & Incident Response: we recreate all stages of an attack using a combination of forensic images, host and network logs, then use our intelligence repository of observed Tactics, Techniques, and Procedures (TTP)  to help integrate additional detections or enhancements with your current security architecture
  • Advanced Cyber Intelligence Training to accelerate the competency level of cyber intelligence analysts with industry-leading security intelligence concepts, practices, and technologies, including practical experience in a Security Intelligence Center (SIC) environment
bar-680

Incident Triage and Response

Lockheed Martin’s incident response support will assist in immediately stabilizing the situation, efficiently analyze the provided data to characterize and reconstruct the incident, and provide recommendations for mitigation, remediation, and prevention to rapidly heal the situation.

Service Highlights:

  • Expert analysts
  • LM Cyber Intelligence
  • Cross Domain Correlation
  • Malware analysis
  • Mitigations for future prevention
  • System Implementations
cyber-eye-460

Cyber Workforce Training

Experiential Cyber Immersion Training and Exercises (EXCITE) accelerates the competency level of cyber intelligence analysts by offering courses that provide personnel with an understanding of security intelligence concepts, mindset, tools, and technologies.

Resiliency Roadmap

Utilizes the Framework for an Intelligence Driven Organization (FIDO) model to guide the evolution of the security organization’s foundational and intelligence driven capabilities to better defend the enterprise network.

Methodology for evolving a security organization’s capabilities:

  • Assesses 23 Foundational and Intelligence-driven Capabilities
  • Basis for which to create an achievable roadmap to move an organization forward
bar-220

Simulated Activities and Exercises

EXCITE features realistic, hands-on exercises for students to immerse in the reconstruction and mitigations of a full attack scenario instrumented through the centrally-managed environment.

  • Exercises and simulations based on real-world threats to build familiarity with attacks and mitigations
  • Concepts such as defensible architectures, incident response, and forensics analysis
  • Encouraging teamwork and collaboration within a challenging and fast-paced environment
  • General security concepts which are technology or company process agnostic to ensure students have a solid understanding of how to translate skills to their environment