Overview 4Core Technology Group, Inc. is a woman/ veteran owned full-service IT and Cyber Security firm based in Historic Petersburg, Virginia. Founded.

Slides:



Advertisements
Similar presentations
Our Corporate Mission Quality Systems Management, Inc. (QSMI)
Advertisements

Life Science Services and Solutions
Service Delivery – your ticket to play
Corporate Overview July 19, Introduction Established in 2005, 7Delta, Inc., a verified Service Disabled Veteran Owned Small Business, is a leading.
Overview of Priorities and Activities: Shared Services Canada Presentation to the Information Technology Infrastructure Roundtable June 17, 2013 Liseanne.
Software Quality Assurance Plan
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
FLAXEM SYSTEM ENTERPRISES
INITIATIVES & STRATEGIES
Building Secure Business for Industry & Government.
Security Controls – What Works
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
ISS IT Assessment Framework
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
© 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
365 IT CONSULTANCY AND PROJECTS PTY (LTD) 04 Smuts Park Corner Northey & Smuts Ave Witbank 1039 Phone: Fax:
Website Hardening HUIT IT Security | Sep
PMSS Final SOW May 22 nd, Statement of Work 2 GLENN RESEARCH CENTER PROJECT MANAGEMENT SUPPORT SERVICES (PMSS) The Contractor shall provide expert.
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
Vulnerability Management Dimension Data – Tom Gilis 24 November 2011.
SEC835 Database and Web application security Information Security Architecture.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
The Challenge of IT-Business Alignment
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
FHWA Reorganization Update Program Performance Management Standing Committee on Performance Management Meeting Detroit, MI October 14, 2011 Peter Stephanos.
“Navigating IT Solutions. Delivering Results.” Bay State, Inc. ◊ 4201 Northview Drive, Suite 408, Bowie, MD ◊ t: ◊
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Strategies for Success in the IRS March 22, 2010 Soft-Con Enterprises Incorporated.
BPK Strategic Planning: Briefing for Denpasar Regional Office Leadership Team Craig Anderson Ahmed Fajarprana August 11-12, 2005.
Cambridge Management Group (CMG) Capabilities Presentation “Taking you into the Future with Visionary IT Solutions Aldie Mill Ct, Suite 200, Chantilly,
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Scott Butson District Technology Manager. Provide professional to all district staff Professional development has been provided on a regular basis to.
The Cloud: Risks, Rewards and Realities Global customer base, major footprint in Fortune 500 Global presence with dual headquarters in the US & offices.
1 MISA Model Douglas Petry Manager Information Security Architecture Methodist Health System Managed Information Security.
Navigating IT Solutions.Delivering Results. Bay State Proprietary l CAPABILITY BRIEFING FOR MITRE 12TH SERVICE ORIENTED ARCHITECTURE.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Adoption and Use of Electronic Medical Records (in Federally Qualified Health Centers) and Supporting an ASP Community Care Network of Virginia, Inc.
1 Lotus Connections Customer Use Cases The following are stories from early customer engagements. They were created to help people understand the many.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
SecSDLC Chapter 2.
Office of Public Health Preparedness and Response Division of Emergency Operations Centers for Disease Control and Prevention.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
© 2015 TriZetto Corporation Managed Services Overview Presenter Names 2.
ICS Area Managers Training 2010 ITIL V3 Overview April 1, 2010.
The NIST Special Publications for Security Management By: Waylon Coulter.
Introduction to Stafford Consulting Company, Inc. SCC Stafford Consulting Company, Inc.
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Sample Fit-Gap Kick-off
ISO 9001:2008/ AS9100 Registered Management Systems Registration
EITS Planning & Decision Support
CAPABILITY BRIEFING July 21, 2017 Joe Guirreri, PMP, ITIL Mobile: Office: Isaac Newton Square Suite.
Introduction to the Federal Defense Acquisition Regulation
Service-Disabled Veteran Owned Small Business
Corporate Overview.
Transforming IT Management
Corporate Overview.
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Agenda Purpose for Project Goals & Objectives Project Process & Status Common Themes Outcomes & Deliverables Next steps.
MAZARS’ CONSULTING PRACTICE
WBB Corporate Capabilities
Capabilities Briefing
IT Management Services Infrastructure Services
EXECUTIVE OVERVIEW “Your Systems, Our Knowledge”
Presentation transcript:

Overview 4Core Technology Group, Inc. is a woman/ veteran owned full-service IT and Cyber Security firm based in Historic Petersburg, Virginia. Founded in 2008, our team of IT and Security professionals possess the technical and managerial expertise required to support Federal, State, Commercial, Medical, Financial and Non-Profit clients. 4Core Technology Group’s highly qualified personnel are adept at developing scalable IT and Cyber Security solutions with processes targeting core business functions and organizational goals, both strategic and long term. Mission To provide cost effective and innovative IT and Cyber Security solutions focused on the core business needs of our clients, while reducing total cost of ownership. Company Objective To approach each client as a value- added service partner and fully engage by asking the BUSINESS questions, not just the TECHNOLOGY questions. This ensures quality throughout the project life cycle and beyond.

Small Business Administration: Woman / Veteran / MBE (Minority) Owned / HUBZONE (Pending) DUNS: CAGE CODE: 5APU0 Our NAICS CODES:

Risk Management Governance and Compliance NIST Cyber Framework Network Assessments Security Awareness Training Security Policy Creation Business Continuity Planning Information Assurance Penetration Testing Managed Services Infrastructure Refresh Helpdesk Services Tier 1-3 Call Center Design & Migration Network Design Application Design/Support Logistics/Asset Management Service Desk Management Configuration Management Change Management Release Management Portfolio Management Problem Management Security Awareness Application Course Development Service & Baseline Document Custom Templates

The “4Core Model Approach” allows us to leverage our internal service offerings of: 1.Cyber Security & IA 2.Infrastructure Management 3.IT Service Management 4.Training & Development Our service offerings can be managed separately or delivered as one dynamic process across the business. Delivering the “4Core Model Approach” as one comprehensive flow allows us to deliver the same repeatable processes, regardless of the size of the effort or organization. The process starts from the top-down. By targeting the core business and corresponding IT functions, we create visibility throughout the engagement, allowing our clients to see and understand the services they are receiving. At 4Core Technology Group, we understand change is a continual part of business growth. These changes increase in complexity and, if not managed properly, will threaten service continuity. We have worked very hard over the years to develop a proprietary IT Business Model that allows us to support our clients in a comprehensive and timely manner. For that reason, we developed the “4Core Model Approach.” Small Business Mid-Size Business Commercial & Enterprise Government Agencies

Asset Management Policy Development Preventive Training C & A Encryption Network Management Penetration Testing Risk Assessment Incident Response Remediation Training Outside Agencies Forensic Analysis By Focusing on the G REEN, We Reduce the Chances of You Spending Time in the R ED “Protect” “Detect” “React”

Teams led by military veterans… Government security clearances Experience Discipline Ongoing training Certifications…

Situation: -NRC lacked process controls, release management, and security control management over IT systems, resulting in NSA Blue Team “F” ratings Tasks: -Develop a consolidated testing capability to validate IT systems prior to deployment into an operational environment -Establish an asset management program to control inventory -Develop user and system policies to improve network operations -Conduct staff training to ensure awareness of the newly developed policies Action: -Established testing lab, conducted security and integration tests, and confirmed operational readiness before fielding any hardware or software solution -Created asset management program to identify equipment on network, plan refreshes, and generate a disposition plan -Drafted documents establishing user and system policies then guided staffing through to approval -Developed and delivered “train the trainer” courses and “leave behind” information packages for the NRC HQ and 4 regional offices Result: -Repeatable processes and viable policies led to improved NRC-wide readiness evaluations, rising from “F” to “B” in two years

“4Core helps keep your organization out of the headlines.”

Corporate Office 2025 Factory Lane Petersburg, VA Office: (804) Fax: (804) Web: