SMALL BUSINESS SHOWCASE COACT, Inc. is a Service Disabled Veteran Owned Small Business (SDVOSB). Niche Areas: Certification & Accreditation (C&A) FIPS140.

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

PRINCIPLES OF A CALIBRATION MANAGEMENT SYSTEM
Alternate Material and Code Reports. This module will highlight the history of the model codes How the building codes treat alternative materials Alternative.
LMI Enterprise Architecture and Information Assurance Integration Approach A Case Study.
MODULE B - PROCESS B1.ASME Organizational Structure B2.Standards Development: Staff and Volunteer Roles and Responsibilities B3.Conformity Assessment:
The Federation for Identity and Cross-Credentialing Systems (FiXs) FiXs ® - Federated and Secure Identity Management in Operation Implementing.
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
Founded in 1997, Intelesis is a veteran owned small business supporting the Office of the Secretary of Defense, the Navy, Air Force, Army, Coast Guard,
IRS SMALL BUSINESS SHOWCASE (BAYFIRST SOLUTIONS, LLC.) THE CONVERGENCE OF PEOPLE PROCESS TECHNOLOGY Small Business Size: SBA Certified 8(a) Small Disadvantaged.
Welcome Nacaro Williams
1st Global QA Conference & 21st SQA Annual Meeting Falcon Consulting Group, LLC 1 Phase I Clinical Study Audits “A Deeper Scrutiny” Cheryl J. Priest, R.N.
Auditing Corporate Information Security John R. Robles Tuesday, November 1, Tel:
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
Prepared for: DISA September 17, 2003 Establishing a Government Information Security System Presented to the IT AND COMMUNICATIONS SYSTEMS SECURITY CONFERENCE.
Conformity Assessment Practical Implications InterAgency Committee on Standards Policy June 2007 Gordon Gillerman Conformity Assessment Advisor Homeland.
Building Secure Business for Industry & Government.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Information Visualization Solutions March 15-16, 2007 Information Visualization Solutions Team Overview & Analysis ~ Michael Hardy.
Security Controls – What Works
Inteco and NIST Cooperation Peter Mell National Vulnerability Database Project Lead Senior Computer Scientist NIST Computer Security Division Tim Grance.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
1 The information contained herein is confidential and proprietary to CollabraLink Technologies, Inc. Headquarters: 211 W. Chicago Ave. Suite 213 Hinsdale,
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
Overview 4Core Technology Group, Inc. is a woman/ veteran owned full-service IT and Cyber Security firm based in Historic Petersburg, Virginia. Founded.
National Information Assurance Partnership NIAP 2000 Building More Secure Systems for the New Millenium sm.
Fraud Prevention and Risk Management
NVLAP Overview and Accreditation Process March 2006.
National Aeronautics and Space Administration Jet Propulsion Laboratory California Institute of Technology Buck Crenshaw, Program Element Manager, NASA-Wide.
Company Overview Provider of IT and program support services to civilian Government agencies and the Department of Defense Project Management ITIL Based.
HW&W, Incorporated 7602 Granada Drive Bethesda, MD Telephone: H W & W, Incorporated e-Business Strategies “Providing Just-in-Time Solutions.
Assurance Continuity: What and How? Nithya Rachamadugu September 25, 2007.
SEC835 Database and Web application security Information Security Architecture.
Charleston Defense Contractors Association Small Business and Industry Outreach Initiative 22 July, 2010.
Federal Cyber Policy and Assurance Issues Dwayne Ramsey Computer Protection Program Manager Berkeley Lab Cyber Security Summit September 27, 2004.
Copyright 2004 Northrop Grumman Corporation April 17, 2006 Gloria Pualani Corporate Director Socio-Economic Business Programs/Government Relations Northrop.
“Navigating IT Solutions. Delivering Results.” Bay State, Inc. ◊ 4201 Northview Drive, Suite 408, Bowie, MD ◊ t: ◊
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
ASC 2008 Office of Small Business Programs Advance Planning Briefing to Industry (APBI) UNCLASSIFIED.
HOW TO DO BUSINESS WITH THE FEDERAL GOVERNMENT Dan Sturdivant Assistant to Director for Outreach Programs Department of Homeland Security.
SMALL BUSINESS SHOWCASE Syneren Technologies Corp. Small Business Size: 8(a), SDB, Woman owned small business Niche Areas: R&D, Hardware, Systems Engineering.
Strategies for Success in the IRS March 22, 2010 Soft-Con Enterprises Incorporated.
U.S. Common Criteria Evaluation & Validation Scheme (CCEVS) Update 25 September 2007 Audrey M. Dale Director, NIAP CCEVS.
10/20/ The ISMS Compliance in 2009 GRC-ISMS Module for ISO Certification.
Statement of Capabilities November 2001 Management Consulting Services Technical Support Federal Aviation Administration Proxtronics is responsible to.
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Navigating IT Solutions.Delivering Results. Bay State Proprietary l CAPABILITY BRIEFING FOR MITRE 12TH SERVICE ORIENTED ARCHITECTURE.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Oklahoma Small Business Manufacturing for Aviation Conference Presentation - Subcontracting August 10, 2005 Nathaniel Stevens Sr. Systems Engineer.
IEEE P2600 Working Group CygnaCom Solutions Introduction Kris Rogers 25 April 2007.
The Art of Information Security: A Strategy Brief Uday Ali Pabrai, CISSP, CHSS.
Information Security tools for records managers Frank Rankin.
Doing Business With The U.S. Environmental Protection Agency EPA’s Mission and Buying Offices; What and How EPA Buys; Finding Procurement Opportunities;
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
THE NATIONAL VOLUNTARY LABORATORY ACCREDITATION PROGRAM (NVLAP ) DECEMBER 3, 2015.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Small Business Support Programs
ISO 9001:2008/ AS9100 Registered Management Systems Registration
Leveraging Assistance from MBDA
Capabilities Matrix Access and Authentication
Company Overview Provider of IT and program support services to civilian Government agencies and the Department of Defense Project Management ITIL Based.
Experience. Commitment. Results.
Corporate Overview.
Chemical Purchasing.
~ 20% of employees are military veterans.
Capabilities Briefing
Veterans Federal Procurement Opportunities
Presentation transcript:

SMALL BUSINESS SHOWCASE COACT, Inc. is a Service Disabled Veteran Owned Small Business (SDVOSB). Niche Areas: Certification & Accreditation (C&A) FIPS140 Cryptographic Modules Testing Security Content Automation Protocol (SCAP) Testing Personal Identity Verification (PIV) Testing C&A Training Classes Common Criteria Intrusion Detection Security Test and Evaluation (ST&E) IRS/Treasury contracts IRS/CPO (5.6 Million Dollars) Department of Treasury/OCC (4 Million Dollars) Dollar amount of Largest Company award Missile Defense Agency (6.5 Million Dollars) 1

SMALL BUSINESS SHOWCASE Brief History COACT, Inc. is a Service Disabled Veteran Owned Small Business (SDVOSB). After 24 years of service at the National Security Agency, and two years at Ford Aerospace Corporation, James McGehee founded COACT, Inc. in COACT, Inc. was initially a one man consulting firm and has grown exponentially. Since 1990, COACT has evolved into a leading provider of security compliance solutions and services. Located in Maryland just off Route 32 West. The facility has 12,000 square feet of office/conference/lab space. COACT Employees hold security clearances ranging from Secret to TSSI. 2

SMALL BUSINESS SHOWCASE Corporate Capabilities COACT, Inc. has developed into a leading provider in the following areas: Certification & Accreditation (C&A) Common Criteria Evaluations Cryptographic Module Testing Independent Verification and Validation (IV&V) Security Test and Evaluation (ST&E) Intrusion Detection Vulnerability Analysis Security Product Evaluations 3

SMALL BUSINESS SHOWCASE Past Performance Both C&A and Common Criteria including such customers as: IRS US Treasury/OCC US Treasury/FMS National Security Agency US Department of Agriculture US Customs Missile Defense Agency Federal Highway Administration Federal Aviation Administration Department of Transportation IBM Boeing Hewlett Packard McAfee, Inc. Canon BAE Systems Cisco Systems Marconi Lexmark International Fortress Technologies 4

SMALL BUSINESS SHOWCASE North American Industry Classification System (NAICS) Security Consulting Services Testing Laboratories Engineering Services 5

SMALL BUSINESS SHOWCASE Other Corporate Attributes GSA Schedule (Schedule 70) ISO 9001 – 2000 Registered Service Disabled Veteran Owned Small Business Cleared Personnel 19 Years in Business No Long Term Debt Employees are certified in the following areas: CISM, CISSP, SSCP 6

SMALL BUSINESS SHOWCASE Other Corporate Attributes - continued Security Content Automation Protocol (SCAP) Testing Personal Identity Verification (PIV) Testing FIPS140 Cryptographic Modules Testing Accredited Laboratories for Common Criteria Common Criteria Testing Laboratory (CCTL) Labs accredited through the National Institute of Standards and Technology (NIST) 7

SMALL BUSINESS SHOWCASE Common Criteria Testing Laboratory The COACT, Inc. CAFÉ Lab is a government evaluation and test facility accredited by the National Volunteer Laboratory Accreditation Program (NVLAP) under lab code Since 1999, the COACT CAFÉ Lab has been an independent Common Criteria Test Laboratory (CCTL). The CAFÉ Lab CCTL is overseen by the National Information Assurance Partnership (NIAP) Common Criteria Evaluation and Validation Scheme (CCEVS) Validation Body. 8

SMALL BUSINESS SHOWCASE Common Criteria Testing Laboratory - continued The CAFÉ Lab has evaluated numerous and diverse product types including switches, web servers, networked data storage devices, databases, firewalls, VPNS, secure wireless devices, and intrusion detection/protection systems ranging from Evaluation Assurance Level 1 (EAL1) through Evaluation Assurance Level 7 (EAL7). The COACT, Inc. CCTL is credited with being the first and only U.S. CCTL to perform an EAL7 evaluation. 9

SMALL BUSINESS SHOWCASE Contract Support COACT, Inc. is currently supporting the Certification Program Office (CPO) by performing System Accreditations for FISMA FY09 reports. In addition, COACT is providing support to the CPO through impact analysis of NIST 800 Series documentation updates on the existing IRS C&A process, maintenance of templates, review of policies and procedures, and support of the FISMA realignment and FDCC initiatives. COACT is also supporting the IRS in their Enterprise Continuous Monitoring (eCM) efforts conducting reviews and analysis of IRS Business Unit testing efforts to ensure the appropriate security controls are tested and that the testing is documented in accordance with established IRS eCM processes and procedures. 10