IT-CNP, Inc. Capability Statement
|
|
|
- Mabel Lloyd
- 10 years ago
- Views:
Transcription
1 Securing America s Infrastructure Security Compliant IT Operations Hosting Cyber Security Information FISMA Cloud Management Hosting Security Compliant IT Logistics Hosting
2 1 IT-CNP, Inc. is a Government service oriented business enterprise headquartered in Columbia, Maryland. IT- CNP prides itself on its ability to strategically deliver information technology solutions to a diverse portfolio of Federal, State and Local Government customers. IT- CNP provides a variety of IT operations, cyber security, FISMA cloud hosting, and IT logistics as a standard set of its service offerings. IT-CNP also provides industry leading certified professionals with solid technical background experience that enable them to address a full range of IT hardware and support issues. Many of our personnel hold Secret and Top Secret level clearances with diverse government agencies. IT-CNP has successfully performed on a multitude of government hosting and infrastructure information management and support contracts throughout Federal, State, and Local Governments. IT-CNP provides its government oriented web hosting services through its hosting division GovDataHosting.Com, which was created to exclusively serve the demanding high availability and reliability needs of modern local, state and federal Government initiatives. IT-CNP utilizes a formal set of policies, procedures, forms and manuals necessary to provide the proper control structures to ensure that all hosted systems are properly maintained and supported. Of significance are the requisite policies and procedures to support configuration control and correct inventory of equipment and security controls applied to specific hosted systems. IT-CNP s formal control structures have been carefully developed to integrate smoothly with NIST standards to ensure consistency and compliance with all the requirements entailed in applicable NIST publications, especially SP Rev. 1, SP Rev.3, and SP Benefits Superior Solutions Mitigated Performance Risk Government Specialized Vendor Extensive Track Record Experienced & Committed Personnel IT-CNP has a successful track record of serving a diverse portfolio of Government hosting oriented services, proven datacenter infrastructure support processes, NIST and DIACAP FISMA security compliant operational, management and technical controls, as well as robust subcontractor management processes and experience in a multivendor solution environment. Core Values Our customer support mission is to always provide platinum level support service. We are proud to serve our customers with solutions that meet most challenging business, technical and system performance requirements while offering 100% availability and performance guarantee. IT-CNP personnel are lead by these core values: Commitment and Assurance Pride Positive Attitudes Professionalism Organized and Structured Flexible and Compliant Why IT-CNP? Strong and established management team Guaranteed secure environment and customer satisfaction Strong past performance and project execution team committed to accomplish various tasks Successful implemented strategic planning process Strong line of business that fortifies the organization and satisfies the client's needs
3 2 IT-CNP provides a breadth and depth of knowledge that uniquely meets the requirements of modern government IT operations landscape. Through unique prescriptive, lessons learned combined with strategic recommendations IT-CNP effectively addresses today's demanding information technology infrastructure transformation needs, technologies and trends including: IT Infrastructure Operational Excellence Private/Public Cloud Infrastructure Strategies Enterprise Mobility Web-scale Information Technology Data Center, Server, Storage and Networking Trends Disaster Recovery and Business Continuity IT Infrastructure Cost Optimization IT-CNP adopted the key principles and best practices of ITIL Service Management Framework as a set of guiding methodologies, resources and service excellence roadmap capabilities to deliver superior and reliable IT infrastructure operational solutions to public sector customers. ITIL framework has evolved into a process-based best practices focuses on a broader holistic service lifecycle. IT-CNP s value comes from supporting the entire lifecycle of a system, from requirements definition, implementation/transition, modernization, sustainment and subsequent decommissioning. IT-CNP provides fully managed system lifecycle services for Federal agency customers that include all aspects of technical implementation, operations and security compliance management.
4 3 Effective implementation of comprehensive cyber security strategy has become one of the most important national priorities of our times. Each government agency is individually responsible for continuation of improvements in its cyber security posture. Government organizations are experiencing an increased need for cost effective information assurance capabilities as well as improved management, control and response techniques. IT-CNP provides specialized cyber security services that assist agencies in providing a safe and secure operating environment, while implementing a departmental information assurance processes to ensure that information security related policy directions as defined by legislative requirements as well as President's Management Agenda guidance and circulars on cyber security are implemented consistently across the enterprise. IT-CNP's cyber security and audit personnel, best practices, lessons learned and information assurance technologies assist federal, state and local government customers in maintaining proactive cyber security posture. Strategic Cyber Security Support Services IT-CNP provides expert information assurance and cyber security consulting advice, guidance, and facilitation regarding current improvement practices, services, and support products to assist agencies in their information assurance and cyber security program management and efforts, which enable them to meet new challenges and continuously improve their mission performance. Enterprise Cyber Security Program Support The goal of IT-CNP's enterprise-wide cyber security program support is to improve the information security posture and reduce cyber security vulnerabilities of customer organization. This is accomplished by improving compliance with mandated regulatory acts and industry standards such as FISMA, OPM, FIPS, NIST, DIACAP, SSAE-16 and all other applicable cyber security regulations, policies, and procedures. In order to reduce cyber security vulnerabilities our security experts support customers to continue developing enterprise-wide directives, manuals and other standards that comply with the kaleidoscope of Federal statutory and regulatory requirements. Compliance with the directives, manuals and other guidance by each agency's respective security program demonstrates improved cyber security performance to the satisfaction of external review bodies such as the Government Accountability Office (GAO), OMB, and independent public auditors. By identifying vulnerabilities and implementing corrective measures, IT-CNP's security compliance experts assist government agencies to effectively reduce the number of opportunities for system compromise, resulting in an overall improvement in the level of protection afforded our information resources. Ongoing monitoring is used to continuously assess the security posture of our operational environments to detect new or unpatched vulnerabilities, offering opportunities for proactive remediation and control.
5 4 Through it's hosting division - GovDataHosting.Com, IT-CNP is able to provide specialized turn-key FISMA compliant solutions to all U.S. Government entities including all civilian executive departments (FISMA NIST Methodology), independent agencies, government corporations, boards, commissions, as well as U.S. Department of Defense (FISMA DIACAP Methodology), Federal law enforcement and Intelligence community. IT-CNP's Cloud Offers: FISMA NIST Cloud Hosting FISMA DIACAP Cloud Hosting FISMA Private Cloud Hosting FISMA S-a-a-S Hosting SSAE-16 Cloud Hosting Custom Hosting Solutions Key features of IT-CNP s FISMA Cloud Hosting: Accelerated FISMA C&A (A&A) Path NIST and DIACAP Compliant Turn-Key Solutions Lower Implementation Risk Reduced FISMA C&A and Operating Costs PMI Certified Implementation Management Team U.S. Based Support Team 100% Infrastructure Availability SLA Responsive High Priority Support Secure FISMA Hosting Delivery Capabilities Active Portfolio of FISMA Compliant Federal Customers Authorization To Operate (ATO) Guarantee Convenient All-Inclusive Fixed Price Model On Demand Resource Utilization-Based Cloud Price Model IT-CNP provides industry leading certified professionals with solid technical background experience, able to support a full range of cyber security, hosted hardware and software support issues. Hosted systems within our secure NIST and DIACAP compliant telecommunications infrastructure are supported by technology specialists experienced in all aspects of FISMA compliance. Our Government customer hosted systems include a wide scope of solutions that range from single dedicated server to large-scale high availability clustered solutions with the use of complete hosting service failover to our alternate disaster recovery site. IT-CNP utilizes a number of proven cost-effective tools, processes and procedures to leverage its existing technology infrastructure and security compliance fabric to reduce the initial and on-going system operating costs associated with FISMA compliance. Unlike other service organizations, IT-CNP takes pride in its track record of technical expertise, responsiveness and total customer satisfaction. We are the industry's only support team that routinely goes above and beyond expected scope of support to ensure that customers receive the worldclass service they expect. More information at
6 5 IT Logistics is the process of planning, implementing, and controlling the effective and efficient flow of software, hardware and related IT services from the point of origin to the point of consumption by technology end users. IT-CNP specializes in effective development and management of optimized IT service supply chain that lowers costs and enhances mission value for our government customers. We provide the following logistics support services in support of our customers' requirements: IT Project and Program Management Program Control IT Acquisition and Integration Support Services Program Outreach System Engineering and CIO Support Business Data Analytics Market Research and Special Studies IT-CNP provides oversight and guidance to ensure projects are successfully executed on-time and within the assigned budget parameters. We also provide expert techniques and resources to conduct inspection, cleaning, transforming, and data modeling with the goal of discovering useful information, suggesting conclusions, and supporting decision making. IT-CNP provides senior-level expertise and Subject Matter Experts (SMEs) in performing studies and analyses to address strategic and business issues that directly relate to the activities required to achieve our customers strategic goals. We perform data analytics on acquisition related data residing in several financial and acquisitions systems and gather data from these sources to conduct in-depth analysis to deliver current and future state of all acquisitions and contracts. IT-CNP s information technology program and project management support services are based on the Project Management Institute (PMI) Project Management Body of Knowledge (PMBOK) methodology, experience, customer agency-specific processes and lessons learned supporting multiple customers. Activities representative of our project and program management support are: Support all phases of the project lifecycle (Initiating, Planning, Executing, Monitoring and Controlling, Closing) Effectively manage and analyze a portfolio of projects through program management Review, assess, and analyze program requirements, goals, and objectives Assess and implement strategies, courses of action and proposals Recommend integration of technical directives and next generation system capabilities Review, assess and analyze contract deliverables and status reports Provide technical management support for the preparation, coordination, facilitation and post evaluation of program management reviews/meetings, technical reviews and other program related events Support and attend meetings, prepare agendas, minutes, and other meeting documentation IT-CNP supports the procurement of brand name software and hardware for customer personnel. We also support acquisition of professional services for the supported programs and program personnel.
7 6 Business Information NAICS Codes Business Size Small Business Certifications SSAE16 - Hosting Services FISMA NIST/DIACAP FEDRAMP (PENDING) PMI - Project Management Institute ISACA - Information Systems Audit and Control Association Technical Certifications - Microsoft, Cisco, Oracle ITIL Information Technology Infrastructure Library Contract Vehicles DHS Eagle NAVY SeaPort-E GSA Schedule 70 Other contract vehicles and blanket purchase agreements Websites - Corporate Website - FISMA Cloud Hosting Solutions
8 7 About IT-CNP, Inc. IT-CNP, Inc., is a leading national provider of the premier government-oriented high availability secure hosting, information management, cyber security and custom helpdesk solutions. Created exclusively to serve the demanding hosting needs of Federal, State and Local government agencies, IT-CNP serves as a unique government oriented hosting solutions provider that delivers proven government past performance, solid value and secure hosting industry's best practices. Corporate Headquarters 9160 Red Branch Road Columbia, MD Tel Fax U.S. Toll Free IT-CNP, Inc. All Rights Reserved. GovDataHosting.Com is a division of IT-CNP, Inc. Reproduction in whole or in part in any form or medium without express written permission is prohibited. IT-CNP and GovDataHosting.Com logos are registered trademarks. Other trademarks contained herein are the property of their respective owners. IT-CNP believes that the information in this publication is accurate as of its publication date and such information is subject to change without notice.
FISMA Cloud GovDataHosting Service Portfolio
FISMA Cloud Advanced Government Oriented Cloud Hosting Solutions Cyber FISMA Security Cloud Information Security Management Compliance Security Compliant Disaster Recovery Hosting Application Cyber Security
IBM Internet Security Systems October 2007. FISMA Compliance A Holistic Approach to FISMA and Information Security
IBM Internet Security Systems October 2007 FISMA Compliance A Holistic Approach to FISMA and Information Security Page 1 Contents 1 Executive Summary 1 FISMA Overview 3 Agency Challenges 4 The IBM ISS
Cloud Security for Federal Agencies
Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service
STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration
STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Overview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
How To Transform It Risk Management
The transformation of IT Risk Management kpmg.com The transformation of IT Risk Management The role of IT Risk Management Scope of IT risk management Examples of IT risk areas of focus How KPMG can help
NetIQ FISMA Compliance & Risk Management Solutions
N E T I Q C O M P L I A N C E S E R I E S NetIQ FISMA Compliance & Risk Management Solutions The Federal Information Security Management Act (FISMA) requires federal agencies to create and implement a
Security Control Standard
Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,
Seeing Though the Clouds
Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services
ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here Authors: Rebecca Onuskanich William Peterson 3300 N Fairfax Drive, Suite 308 Arlington, VA 22201 Phone: 571-481-9300 Fax: 202-315-3003
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
STATE OF MARYLAND 2017 INFORMATION TECHNOLOGY MASTER PLAN (ITMP) Department of Information Technology David Garcia; State CIO
STATE OF MARYLAND 2017 INFORMATION TECHNOLOGY MASTER PLAN (ITMP) Department of Information Technology David Garcia; State CIO Introduction Since taking office in January 2015, Governor Larry Hogan has
MANAGEMENT CONSULTING ENTERPRISE SOLUTIONS IT OUTSOURCING. CAPABILITY briefing
MANAGEMENT CONSULTING ENTERPRISE SOLUTIONS IT OUTSOURCING MILESTONES 1999-Present 8(a) / SDB Certified Woman-Owned Certified GSA Schedule 70 GSA STARS II NAICS Codes 541511, 541512, 541519, 541618, 541611,
Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS
Department of Veterans Affairs VA Directive 6004 Washington, DC 20420 Transmittal Sheet September 28, 2009 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS 1. REASON FOR ISSUE: This Directive establishes
December 8, 2011. Security Authorization of Information Systems in Cloud Computing Environments
December 8, 2011 MEMORANDUM FOR CHIEF INFORMATION OFFICERS FROM: SUBJECT: Steven VanRoekel Federal Chief Information Officer Security Authorization of Information Systems in Cloud Computing Environments
The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative
The Council of the Inspectors General on Integrity and Efficiency s Cloud Computing Initiative September 2014 Council of the Inspectors General on Integrity and Efficiency Cloud Computing Initiative Executive
Achieve Economic Synergies by Managing Your Human Capital In The Cloud
Achieve Economic Synergies by Managing Your Human Capital In The Cloud By Orblogic, March 12, 2014 KEY POINTS TO CONSIDER C LOUD S OLUTIONS A RE P RACTICAL AND E ASY TO I MPLEMENT Time to market and rapid
DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 CLOUD COMPUTING SERVICES
DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 Washington, DC 20420 Transmittal Sheet February 28, 2012 CLOUD COMPUTING SERVICES 1. REASON FOR ISSUE: This Directive establishes the Department of Veterans
DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE
DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE 1 Introduction and Instructions This sample Statement
How To Monitor Your Entire It Environment
Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................
Application Deployment Experts
Application Deployment Experts Introduction UNICOM Engineering, a UNICOM Global company, is a leading provider of purpose-built application platforms and lifecycle deployment services for software developers
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Network Management and Defense Telos offers a full range of managed services for:
Network Management and Defense Telos offers a full range of managed services for: Network Management Operations Defense Cybersecurity and Information Assurance Software and Application Assurance Telos:
EDWARDS PROJECT SOLUTIONS NORTH AMERICAN INDUSTRY CERTIFICATION SYSTEM (NAICS) CODES QUALIFICATIONS WITH FULL DESCRIPTIONS
REVISED: J 5523920 PORTFOLIO MANAGEMENT SIZE STANDARD: $7.0M Edwards Project Solution ( ) provides portfolio management services through building enterprise project management solutions and providing portfolio
Securing the Cloud Infrastructure
EXECUTIVE STRATEGY BRIEF Microsoft recognizes that security and privacy protections are essential to building the necessary customer trust for cloud computing to reach its full potential. This strategy
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.2 9/28/11 INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A) I. PURPOSE This directive
Benefits and Potential Drawbacks to Implementing SAP as a Hosted Solution; Run SAP Like a Factory Factory Controls
8/24/12 Information Systems Audit and Control Association Silicon Valley Conference (ISACA SV) Benefits and Potential Drawbacks to Implementing SAP as a Hosted Solution; Run SAP Like a Factory Factory
Data- Centric Enterprise Approach to Risk Management Gregory G. Jackson, Sr. Cyber Analyst Cyber Engineering Division Dynetics Inc.
Data- Centric Enterprise Approach to Risk Management Gregory G. Jackson, Sr. Cyber Analyst Cyber Engineering Division Dynetics Inc. May 2012 (Updated) About the Author Gregory G. Jackson is a senior cyber
Network Systems Integration
Network Systems Integration Strong Networks for Mission-Critical Services Turnkey Solutions for Today s Large-Scale Networks Government and business enterprises turn to General Dynamics Information Technology
STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE
STATEMENT OF SYLVIA BURNS CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF THE INTERIOR BEFORE THE HOUSE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON INFORMATION TECHNOLOGY AND SUBCOMMITTE
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Cloud Consulting Services
Cloud Data Center Business Intelligence Enterprise Computing Solutions Services Cloud Consulting Services Service Overview Embarking on the road to cloud computing is not a simple journey and shouldn t
Open Group Vulnerability Management Proposal Mike Jerbic, November 16, 2003
Open Group Vulnerability Management Proposal Mike Jerbic, November 16, 2003 Purpose and audience of this paper This proposal is a starting point put forward to the Open Group Security Forum s membership
Optimizing the Data Center for Today s Federal Government
WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S FEDERAL......... GOVERNMENT............................... Optimizing the Data Center for Today s Federal Government Who should read this paper CIOs,
Everything You Wanted to Know about DISA STIGs but were Afraid to Ask
Everything You Wanted to Know about DISA STIGs but were Afraid to Ask An EiQ Networks White Paper 2015 EiQ Networks, Inc. All Rights Reserved. EiQ, the EiQ logo, the SOCVue logo, SecureVue, ThreatVue,
Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security.
Deputy Chief Financial Officer Peggy Sherry And Chief Information Security Officer Robert West U.S. Department of Homeland Security Testimony Before the Subcommittee on Government Organization, Efficiency
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.
Corporate Overview MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.com IS&P Practice Areas Core Competencies Clients & Services
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
The IBM Solution Architecture for Energy and Utilities Framework
IBM Solution Architecture for Energy and Utilities Framework Accelerating Solutions for Smarter Utilities The IBM Solution Architecture for Energy and Utilities Framework Providing a foundation for solutions
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
Security Control Standard
Department of the Interior Security Control Standard Program Management April 2011 Version: 1.1 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Asset management guidelines
Asset management guidelines 1 IT asset management (ITAM) overview Objective Provide a single, integrated view of agency assets in order to allow agencies to identify the asset location and assess the potential
Information Systems Security Line of Business (ISS LoB)
Information Systems Security Line of Business (ISS LoB) Information Security and Privacy Advisory Board George Washington University Washington, DC March 22, 2007 Agenda Background Status Next Steps Background
Navigating the NIST Cybersecurity Framework
Navigating the NIST Cybersecurity Framework Explore the NIST Cybersecurity Framework and tools and processes needed for successful implementation. Abstract For federal agencies, addressing cybersecurity
United States Department of Agriculture. Office of Inspector General
United States Department of Agriculture Office of Inspector General U.S. Department of Agriculture, Office of the Chief Information Officer, Fiscal Year 2013 Federal Information Security Management Act
Defending the Database Techniques and best practices
ISACA Houston: Grounding Security & Compliance Where The Data Lives Mark R. Trinidad Product Manager [email protected] March 19, 2009 Agenda Understanding the Risk Changing threat landscape The target
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
North American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
AUDIT REPORT. The Department of Energy's Management of Cloud Computing Activities
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Department of Energy's Management of Cloud Computing Activities DOE/IG-0918 September 2014 Department
Caretower s SIEM Managed Security Services
Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During
Statement of Objectives. Special Notice D15PS00295 Nationwide Public Safety Broadband Network (NPSBN)
Special Notice D15PS00295 Nationwide Public Safety Broadband Network (NPSBN) 4/27/2015 C Statement of Objectives First Responder Network Authority (FirstNet) Nationwide Public Safety Broadband Network
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 [email protected] James J. Costello Director, Enterprise IT Security April 8,
The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant
THE MARKET LEADER IN IT, SECURITY AND COMPLIANCE SERVICES FOR COMMUNITY FINANCIAL INSTITUTIONS The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant Agenda
Security Authorization Process Guide
Security Authorization Process Guide Office of the Chief Information Security Officer (CISO) Version 11.1 March 16, 2015 TABLE OF CONTENTS Introduction... 1 1.1 Background... 1 1.2 Purpose... 2 1.3 Scope...
The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence
How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver White Paper: BEST PRACTICES The Modern Service Desk: Contents Introduction............................................................................................
2.0 ROLES AND RESPONSIBILITIES
2.0 ROLES AND RESPONSIBILITIES This handout describes applicable roles and responsibilities for the Capital Planning and Investment Process (CPIC) as presented in the NIST Integrating IT Security into
Datacenter Management and Virtualization. Microsoft Corporation
Datacenter Management and Virtualization Microsoft Corporation June 2010 The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the
5 FAH-8 H-351 CLOUD COMPUTING
5 FAH-8 H-350 CLOUD COMPUTING (Office of Origin: IRM/BMP) 5 FAH-8 H-351 CLOUD COMPUTING GOVERNANCE BOARD a. The Cloud Computing Governance Board (CCGB) exists to provide advice to the Authorizing Official
Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 AP-2/03-1
Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP 800-60 FISMA Legislation Overview (Public Law 107-347) Framework for ensuring effectiveness of Federal
INFORMATION SIMPLIFIED
INFORMATION SIMPLIFIED Business Solutions for the Aerospace and Defense Industry Primavera Project Portfolio Management Applications Remaining Competitive and Compliant in the Aerospace and Defense Industry
Managed Security Services D e l i vering real-time protection to help organizations st r e n g t h e n their security posture in the face of today s
Managed Security Services D e l i vering real-time protection to help organizations st r e n g t h e n their security posture in the face of today s emerging threats. In today s sophisticated online env
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
SOLUTION WHITE PAPER. BMC Manages the Full Service Stack on Secure Multi-tenant Architecture
SOLUTION WHITE PAPER BMC Manages the Full Service Stack on Secure Multi-tenant Architecture Table of Contents Introduction................................................... 1 Secure Multi-tenancy Architecture...................................
Managed Services Overview
Managed Services Overview Today s IT environments are extremely complex and challenging, especially for heterogeneous environments that require a myriad of skills to manage the IT lifecycle. From procurement
Small Business. Leveraging SBA IT resources to support America s small businesses
Small Business Administration Information Technology Strategic Plan ( ITSP) 2012-2016 Leveraging SBA IT resources to support America s small businesses Message from the Chief Information Officer The Small
Whitepaper: 7 Steps to Developing a Cloud Security Plan
Whitepaper: 7 Steps to Developing a Cloud Security Plan Executive Summary: 7 Steps to Developing a Cloud Security Plan Designing and implementing an enterprise security plan can be a daunting task for
AdvancedHosting SM Solutions from SunGard Availability Services
AdvancedHosting SM Solutions from SunGard Availability Services A SINGLE POINT OF CONTACT A COMPLETE MANAGED SERVICES SOLUTION Higher levels of availability Continuous investment in people, technology
agility made possible
SOLUTION BRIEF CA IT Asset Manager how can I manage my asset lifecycle, maximize the value of my IT investments, and get a portfolio view of all my assets? agility made possible helps reduce costs, automate
STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration
STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE SCIENCE, SPACE AND TECHNOLOGY COMMITTEE SUBCOMMITTEE
AUDIT REPORT. The Energy Information Administration s Information Technology Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Energy Information Administration s Information Technology Program DOE-OIG-16-04 November 2015 Department
Symantec Control Compliance Suite. Overview
Symantec Control Compliance Suite Overview Addressing IT Risk and Compliance Challenges Only 1 in 8 best performing organizations feel their Information Security teams can effectively influence business
