Cyber Test & Evaluation


Today’s cyber-contested environment demands cradle to grave testing and evaluation for military systems. Doing so helps to discover and remediate vulnerabilities during development – saving time and money later in the lifecycle of the technology. It also maintains that technology’s resiliency to the inevitable cyberattack throughout its operational lifetime.

At Lockheed Martin, we have proven tools, processes, and expertise to test and evaluate military systems against the ever-evolving cyber threats. Moreover, we have over a decade of experience through our support of the United States’ Test Resource Management Center’s National Cyber Range (NCR). The range gives government organizations insights into how well their existing information technologies can meet the demands of a rapidly evolving cybersecurity landscape. Because the NCR is secure and can be scaled in size, users can answer their critical cyber questions quickly, accurately, and safely at a fraction of the cost when compared to building and operating a similar privately-owned capability.

Available evaluations for cyber and mission impact

Acquisition Program Testing

Acquisition Program Testing

System of System Testing

System of System Testing

Hardware in the Loop

Hardware in the Loop

Reliable Mission Effectiveness Data

Reliable Mission Effectiveness Data

Cyber Table Tops

Cyber Table Tops

Proven Experience

Using Cyber Table Tops

We’re constantly generating new processes and procedures that programs and government agencies can use to test and evaluate the cybersecurity of the technology. One prime example is the Cyber Table Top (CTT) process. In collaboration with TRMC, we developed the process that applies war-gaming to identify high risk cyber threats to systems. These CTTs consider electronic warfare, supply chains, and other factors beyond cyber, and often focus on the interplay between these domains. The CTT process has been published in an ITEA Journal and adopted as a NAVAIR best practice, and by the Office of the Secretary of Defense DT&E as a key cyber resilience assessment tool.
Latest News   ___
Protect Against Expert Network Solicitations
Sep 19, 2023
Story
Stay vigilant against the “hidden spies” in your inbox, online or on your mobile devices
Be Proactive to Mitigate the Threat of Ransomware
Sep 19, 2023
Story
Prevent intrusion against sophisticated malware posing significat risk to your business
Cyber/CMMC Level 1 & 2 Training Available
Mar 24, 2023
Story
This training is self-paced and intended for a range of roles and responsibilities including from organizations seeking certification and CMMC compliance.
Contacts   ___