Capabilities Matrix Access and Authentication Cyber Systems Engineering VPNs and Encryption Firewall and IDS monitoring Risk Assessment Security Audits Vulnerability Assessments Penetration Testing Compliance Validation CONOPs Development Establish Policies CMMI / 6 Sigma process utilization COOP / DRP Image Protection 24x7 Monitoring Security Device Monitoring Incident Detection and Resolution Forensics Analysis Web Proxy Analysis Data Leakage Prevention C&A - DITSCAP FISMA NIST Real-time Recovery 24x7 Response Predictive Analysis Intrusion Analysis Insider Analysis Cyber Warrior Courses Technical Security Training Security Dashboard PKI certificates Metrics and Security ROI