Cyber Test & Evaluation

Cyber Test & Evaluation

Rapid-Realistic-Diverse Environments


Today’s cyber-contested environment demands cradle to grave testing and evaluation for military systems. Doing so helps to discover and remediate vulnerabilities during development – saving time and money later in the lifecycle of the technology. It also maintains that technology’s resiliency to the inevitable cyberattack throughout its operational lifetime.

At Lockheed Martin, we have proven tools, processes, and expertise to test and evaluate military systems against the ever-evolving cyber threats. Moreover, we have over a decade of experience through our support of the United States’ Test Resource Management Center’s National Cyber Range (NCR). The range gives government organizations insights into how well their existing information technologies can meet the demands of a rapidly evolving cybersecurity landscape. Because the NCR is secure and can be scaled in size, users can answer their critical cyber questions quickly, accurately, and safely at a fraction of the cost when compared to building and operating a similar privately-owned capability.

Available evaluations for cyber and mission impact

Acquisition Program Testing

Acquisition Program Testing

System of System Testing

System of System Testing

Hardware in the Loop

Hardware in the Loop

Reliable Mission Effectiveness Data

Reliable Mission Effectiveness Data

Cyber Table Tops

Cyber Table Tops

Proven Experience

Using Cyber Table Tops

We’re constantly generating new processes and procedures that programs and government agencies can use to test and evaluate the cybersecurity of the technology. One prime example is the Cyber Table Top (CTT) process. In collaboration with TRMC, we developed the process that applies war-gaming to identify high risk cyber threats to systems. These CTTs consider electronic warfare, supply chains, and other factors beyond cyber, and often focus on the interplay between these domains. The CTT process has been published in an ITEA Journal and adopted as a NAVAIR best practice, and by the Office of the Secretary of Defense DT&E as a key cyber resilience assessment tool.