Capabilities Briefing

Slides:



Advertisements
Similar presentations
Mission Oriented, Customer Focused
Advertisements

SMALL BUSINESS SHOWCASE COACT, Inc. is a Service Disabled Veteran Owned Small Business (SDVOSB). Niche Areas: Certification & Accreditation (C&A) FIPS140.
SHIFTING INFORMATION SECURITY LANDSCAPE FROM C&AS TO CONTINUOUS MONITORING ANDREW PATCHAN JD, CISA ASSOCIATE IG FOR IT, FRB LOUIS C. KING, CPA, CISA, CMA,
METRICS AND CONTROLS FOR DEFENSE IN DEPTH AN INFORMATION TECHNOLOGY SECURITY ASSESSMENT INITIATIVE.
Nick Vennaro, NHIN Team (Contractor), Office of the National Coordinator for Health IT Michael Torppey, CONNECT Health IT Security Specialist (Contractor)
Federal Risk and Authorization Management Program (FedRAMP) Lisa Carnahan, Computer Scientist National Institute of Standards & Technology Standards Coordination.
NIH Security, FISMA and EPLC Lots of Updates! Where do we start? Kay Coupe NIH FISMA Program Coordinator Office of the Chief Information Officer Project.
1 Disaster Recovery “Protecting City Data” Ron Bergman First Deputy Commissioner Gregory Neuhaus Assistant Commissioner THE CITY OF NEW YORK.
4/29/2009Michael J. Cohen1 Practical DIACAP Implementation CS526 Research Project by Michael J. Cohen 4/29/2009.
Security Controls – What Works
NLRB: Information Security & FISMA Daniel Wood, Chief IT Security February 19, 2004.
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Christopher P. Cabuzzi CS 591 DEFENSE INFORMATION ASSURANCE CERTIFICATION & ACCREDITATION PROCESS (DIACAP) Chris Cabuzzi, DIACAP, 12/8/10 1.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Stephen S. Yau CSE , Fall Security Strategies.
Risk Management Framework
Overview 4Core Technology Group, Inc. is a woman/ veteran owned full-service IT and Cyber Security firm based in Historic Petersburg, Virginia. Founded.
Security Assessments FITSP-M Module 5. Security control assessments are not about checklists, simple pass-fail results, or generating paperwork to pass.
HW&W, Incorporated 7602 Granada Drive Bethesda, MD Telephone: H W & W, Incorporated e-Business Strategies “Providing Just-in-Time Solutions.
Protective Measures at NATO Headquarters Ian Davis Head, Information Systems Service NATO Headquarters Brussels, Belgium.
Security Assessments FITSP-A Module 5
NIST Special Publication Revision 1
Federal Cyber Policy and Assurance Issues Dwayne Ramsey Computer Protection Program Manager Berkeley Lab Cyber Security Summit September 27, 2004.
Enterprise Risk Management & IT Compliance March 30, 2010 Presented by: Ken Rowe, Director Enterprise Systems Assurance & Chief Security Officer University.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
Roles and Responsibilities
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Strategies for Success in the IRS March 22, 2010 Soft-Con Enterprises Incorporated.
Security is not just… 1 A Compliance Exercise Certification and Accreditation FISMA.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Shift Left Feb 2013 Page-1 DISTRIBUTION STATEMENT A – Cleared for Open Publication by OSR on January 17 th, 2013 – SR case number 13-S-0851 Dr. Steven.
Navigating IT Solutions.Delivering Results. Bay State Proprietary l CAPABILITY BRIEFING FOR MITRE 12TH SERVICE ORIENTED ARCHITECTURE.
University of Maryland University College (UMUC) 3/11/2004 POA&M and FISMA What does it really mean? FISSEA Annual Conference.
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
Defense Security Service Contractor SIPRNet Process June 2013
Action Tracker · Status Report | Bill Moss, Assistant Secretary Oct 6, 2015 Aging and Long-Term Support, Administration Background Group Topic / Strategic.
Doane Pet Care Company Pet Food Safety System (PFSS) M.W. Merkel September 23, 2003 Animal Feed Safety System Public Meeting.
FISMA 101.
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
US Department of State Jay Coplon. My Commitment You will get a sense for how we do C&A You will find value in being here All of your questions will be.
ERCOT IT Update Ken Shoquist VP, CIO Information Technology Board Meeting February 2004.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
OMB Status 03/31/05 Monday, June 6, 2005 OMB Progress 03/31/05 Vicki Novak Tom Luedtke Gwen SykesPat DunningtonGwen Sykes Best in Government! Steps to.
US Department of State Jay Coplon. My Commitment You will get a sense for how we do C&A You will find value in being here All of your questions will be.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
OFFICE OF VA ENTERPRISE ARCHITECTURE VA EA Cybersecurity Content Line of Sight Report April 29, 2016.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Service Design.
ISSM 101 Break-Out Session
PL ALTESS Application Modernization and Risk Management Framework Services Presented By: Scott Friend Chad Vance.
Agency ATO Quick Guide September 21, 2015
Presenter: Mohammed Jalaluddin
ISO 9001:2008/ AS9100 Registered Management Systems Registration
Team 1 – Incident Response
Introduction to the Federal Defense Acquisition Regulation
Description of Revision
Threat Systems Management Office (TSMO)
Matthew Christian Dave Maddox Tim Toennies
Best Practices in Cyber Security Maggy Powell Senior Manager Real-Time Systems Security Exelon 21 March 2018.
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Corporate Overview.
Compliance Toolbox.
Viewtrust Continuous Security, Risk and Compliance Management
~ 20% of employees are military veterans.
September 27, 2017 Initiation Request
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
{Project Name} Organizational Chart, Roles and Responsibilities
Presentation transcript:

Capabilities Briefing “Shelter From the Storm” Abris Technologies, LLC, your trusted Partner Capabilities Briefing

A professional Services Corporation Founded in 2018 A professional Services Corporation Headquartered in Alexandria, Virginia Certified/Verified Service Disabled Veteran Owned Small Business (SDVOSB) Your Trusted Partner

Our Services Standardize documentation and artifact creation for controls under NIST Risk Management Framework(RMF). Manage the entire life cycle of RMF from System categorization and control selection to establishing and maintaining a compliant continuous monitoring status Prioritized POA&M tracking and management by weighted scoring of vulnerabilities Assist management in production of policy documents and procedural updates to ensure compliance with applicable controls for their environments System control assessment, authorization package assembly and submission, review with System Owners and Security Officers Your Trusted Partner

Our Services Overall system security team management Our Capabilities include: Overall system security team management System Security Plans Plan of Action and Milestone Trackers Vulnerability and Patching effectiveness metrics Business Continuity plans Policy document updates Standard Operating Procedure (SOP) updates, as needed Control Assessment Plans Privacy Impact Assessments Review and update of existing , applicable documents to ensure completeness and RMF compliance with selected controls Your Trusted Partner

Our Services Cybersecurity and Information Assurance Abris Technologies comprehensive approach is designed to align Information Assurance and Risk Management initiatives into a coherent, repeatable process that significantly reduces the overhead of system authorization towards the goal of Continuous Monitoring. We achieve these results by: Use of document templates tuned to selected controls for systems Integrated lists of artifact types to assist in validating control compliance Standardizing Authorization Package contents for signature Use of Continuous monitoring schedules to achieve “ConMon” status POA&M Tracker and metrics standardized over time. Continuous interface with customers to ensure resources are carefully managed to provide best value. Your Trusted Partner

Past Performance DARPA, IA SME, Primary POC for Cyber Security Provider (CNDSP) Inspection Veteran coordinated the actions of 62 personnel to assemble and present the accreditation package for the agency wide Defense Information Systems Agency inspection of agency network defense, insider threat and overall network health, achieving three “commendable” results out of nine possible. Pentagon, Joint Staff IA SME for J8 systems Led three teams to the certification of nine systems and the building of a Test and Development enclave for the use of all the Joint Staff. TSA, Primary Certifier Managed the migration and rebuild of the Agency Test and Development enclaves from a contractor facility to a DHS data center 1200 miles away, with no loss of functionality. Managed ten other systems at the same time. Enabled remote scanning of all systems to save travel money. Your Trusted Partner

Contract Vehicles Working currently to partner with a small company to get started . NAICS Codes: 541512 541513 541519 541690 Your Trusted Partner