Cyber Security: Defending Your Enterprise

Similar documents
Reliable, Repeatable, Measurable, Affordable

Cyber Security Solutions

Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength

Rapid Response, Total Support. Homeland Security Solutions that Keep America Safe

Trusted Experience on Major Data Center Initiatives

Network Systems Integration

Middle Class Economics: Cybersecurity Updated August 7, 2015

Network Management and Defense Telos offers a full range of managed services for:

Cybersecurity Delivering Confidence in the Cyber Domain

CyberSecurity Solutions. Delivering

Flexible, Life-Cycle Support for Unique Mission Requirements

REQUEST FOR INFORMATION

How To Protect Your Network From Attack From A Network Security Threat

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Microsoft s cybersecurity commitment

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

HEALTHCARE SECURITY AND PRIVACY CATALOG OF SERVICES

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

Critical Controls for Cyber Security.

Cybersecurity Converged Resilience :

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Executive Overview...4. Importance to Citizens, Businesses and Government...5. Emergency Management and Preparedness...6

FREQUENTLY ASKED QUESTIONS

Developing a Mature Security Operations Center

Preemptive security solutions for healthcare

Cyber Security Research and Development a Homeland Security Perspective


THE WORLD IS MOVING FAST, SECURITY FASTER.

A Comprehensive Cyber Compliance Model for Tactical Systems

Meeting Federal Information Assurance (IA) Monitoring Requirements with SecureVue

Advancing the U.S. Air Force Mission

Strategic Plan On-Demand Services April 2, 2015

How to Lead the People in a Program Based Environment

CYBER SECURITY FOR LONG TERM EVOLUTION

Managing the Ongoing Challenge of Insider Threats

Cybersecurity Enhancement Account. FY 2017 President s Budget

Amid Ongoing Transformation and Compliance Challenges, Cybersecurity Represents Top IT Concern in Financial Services Industry

Health Solutions. Mission-Critical Support Across the Health Spectrum

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Enterprise Security Tactical Plan

Security Solutions Secure your network and minimize the risks

OFFICE OF ENTERPRISE TECHNOLOGY SERVICES QUARTERLY REPORT ON

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Defending Against Data Beaches: Internal Controls for Cybersecurity

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

High End Information Security Services

Enterprise Computing Solutions

DoD Strategy for Defending Networks, Systems, and Data

McAfee Security Architectures for the Public Sector

Security in Space: Intelsat Information Assurance

Building Security In:

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012

FFIEC Cybersecurity Assessment Tool

Caretower s SIEM Managed Security Services

Cyber Education triangle clarifying the fog of cyber security through targeted training

El Camino College Homeland Security Spring 2016 Courses

Increase insight. Reduce risk. Feel confident.

Cisco Master Security Specialization Practice Areas Summary. February 2016

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Injazat s Managed Services Portfolio

SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK

GEARS Cyber-Security Services

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Cybersecurity on a Global Scale

Evaluation of DHS' Information Security Program for Fiscal Year 2015

Managing the Unpredictable Human Element of Cybersecurity

Mike Vogel Executive Account Manager. Etmara Smith Manager, Supplier Diversity Small Business Program. Harris IT Services - Herndon, VA

Digital Forensics G-Cloud Service Definition

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

Preventing and Defending Against Cyber Attacks October 2011

Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record

ClearSkies. Re-Defining SIEM

Computer Network Security & Privacy Protection

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs

ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002

Payment Card Industry Data Security Standard

Preventing and Defending Against Cyber Attacks November 2010

Preventing and Defending Against Cyber Attacks June 2011

Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the

Big Data, Big Risk, Big Rewards. Hussein Syed

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Federal Aviation Administration

External Supplier Control Requirements

HIPAA Compliance: Meeting the Security Challenge. Eric Siebert Author and vexpert. whitepaper

Information Technology Risk Management

Intelligence Driven Security

Open Source Software for Cyber Operations:

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Cybersecurity Strategic Consulting

NetIQ FISMA Compliance & Risk Management Solutions

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

KeyLock Solutions Security and Privacy Protection Practices

STATE OF NEW JERSEY Security Controls Assessment Checklist

It s about service. to clients to colleagues to community to country

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

Transcription:

Cyber Security: Defending Your Enterprise www.gdit.com/cyber RELIABLE, REPEATABLE MEASURABLE, AFFORDABLE

The Threat Spectrum Outsider Threats Terrorists, theft, spies, hackers, foreign governments, denial of service Insider Threats Human error, systemic failures, malicious behavior, theft, spying, malware Technology Hurdles Network convergence, IT infrastructure and channel consolidation, cloud computing, open source, social networking, new applications, upgrades, Internet of Things (IoT) Threat Frequency and Defense Agility Increased frequency of new threats and your agility to adapt a best defense Page 1

DEFENSE-IN- DEPTH ACROSS YOUR CYBER SECURITY LIFE-CYCLE Our solutions and support protect critical cyber assets for military missions and enterprises worldwide. Faced with today s intensifying threat environment, where do you turn for cyber security answers you can trust? How do you keep pace with rapidly changing threats, technologies and requirements? How do you choose the best cyber defense? And once in place, how do you know it s working 24/7? General Dynamics Information Technology helps you define your cyber security needs and provides the solutions to achieve them. As a leading cyber security integrator, we deliver agile, defense-in-depth solutions geared to your mission and enterprise needs. Our full life-cycle capabilities range from assessments and architectures to operational support to innovation. After decades of proven experience with the defense and intelligence communities, we know how to make cyber security work reliably, repeatably, measurably and affordably. Our cyber security solutions have defended the most mission-critical systems, including tactical, cross-domain, large-enterprise and national networks. We use leading edge technology and tools to correlate information on millions of cyber events to identify critical actionable incidents. We also use proven metrics to measure network defense performance. You know how well your cyber security operations are working and how best to improve them. Proven Life-Cycle Capabilities Enterprise Security Assessments: security surveys Risk Management Framework (RMF) Accreditation & Authorization (A&A) certification and accreditation (C&A) compliance audits penetration and vulnerability testing social engineering audits document destruction audits email and web security testing. Defense-in-Depth Architectures: engineering and integration of large-scale Computer Network Defense (CND) solutions governance Security Operations continuous monitoring patch management continuity of operations resilience adaptation to changing threats. Secure Networks Wireless and Wired: voice, data, video, email and instant messaging multi-level security environments IP-based unified communications systems critical infrastructure protection. Detection and Identification: intrusion detection and prevention systems continuous network monitoring operations management and metrics training and documentation real-time network traffic analysis hostbased security and controls. Defense and Protection: perimeter defenses access controls security breach containment computer forensics CIRT operations disaster and data recovery insider threat protection vulnerability remediation infrastructure hardening. Innovation: security refresh decision support tools visualization tools correlation engines Big Data analytics tools management tools proactive support to handle new threats, technologies and requirements. General Dynamics Information Technology defends our Nation s critical cyber resources and networks. Page 2

EXPERIENCE PROVEN ON MAJOR CYBER SECURITY INITIATIVES General Dynamics Information Technology s cyber security solutions protect large-scale information and network assets for U.S. federal government enterprises, such as the IRS Defending Military Enterprises Worldwide. General Dynamics Information Technology is the leading provider of cyber security solutions to the U.S. Department of Defense. As prime contractor for the Air Force and the Air Force Intranet program, we delivered cyber defense capability which protects USAF data networks through 16 cyber security gateways that form a security boundary to shield 105 bases worldwide. This effort includes redesign of the USAF s unclassified and classified network management and network defense architecture. Responding to an urgent operational need for Pacific Air Forces (PACAF), we designed and deployed the initial intrusion prevention system and a modernized security information and event management capability within a compressed timeline. We provide complete cyber security support to U.S. Army posts worldwide, including operation and maintenance of Army Regional Cyber Centers (RCCs)s serving entire theaters of operation and more than 500 successful C&A/ A&A/RMF assessments. Our cyber security experts evaluate products for technology insertion and furnish penetration testing for state-of-the-art combat technologies. Cyber Defense for Homeland Security Enterprises. We operate and sustain U.S. Customs and Border Protection s SOC 24/7, ensuring network and information security for more than 60,000 users. The CBP SOC processes tens of millions of events per month, cutting through the noise to identify and handle about 175 actionable incidents. We built and manage the SOC for U.S. Citizenship and Immigration Services (USCIS), providing ITIL-based security management for 18,000 users at 250 offices throughout the world. Working with the U.S. Coast Guard (USCG) Telecommunication and Information Systems Command, we supported the design, security and implementation of all USCG enterprise IT, Windows-based systems. Operating the USCG CIRT, we supported an enterprise with gateways that handle in excess of 15.3 million emails per month, 43,000 of which have infections or malicious payloads. Our team integrated cyber security into all phases of the Pentagon Renovation program, a ten-year modernization of Pentagon tenant organizations to a fully secure enterprise IT environment. This included SOC development and advanced capabilities such as secure Voice over Internet Protocol (VoIP). For over 10 years, we helped the Missile Defense Agency ensure the security of its information infrastructure, providing information assurance (IA) services and C&A to meet Department of Defense Information Assurance Certification and Accreditation Process (DIACAP) requirements. Page 3

KNOWLEDGE GAINED ON MAJOR PROGRAMS BRINGS BEST PRACTICES TO OUR CUSTOMERS The SOCs and CIRTs we operate process millions of potential security events daily to identify actionable incidents, typically two hundred or less. Supporting the Intelligence Community s (IC) Global Mission. General Dynamics Information Technology meets the demanding requirements of the IC. We are building and operating a modernized enterprise IT infrastructure, which employs an integrated enterprise data center designed to ensure the highest levels of security in a virtualized, cloud computing environment. We support IC security and computer network defense operations on highly classified, national networks. High-Level Security and Privacy Requirements for Modern Healthcare. Federal health organizations and commercial payers rely on General Dynamics Information Technology for expert services in cyber security, IA, regulatory compliance and applications security management. Our A&A/C&A audits ensure compliance with key standards, including HIPAA, FISMA and the HITRUST Common Security Framework. Continuous monitoring and SOC services defend information networks and protect data privacy. Proven analysis and testing services and tools ensure the security of new applications and ehealth initiatives. Our GDIT Cloud service offers FedRAMP-approved Cloud Services via our own secure data center, designed to meet strict security requirements and provide cloud services as well as managed hosting for applications and data warehousing. Supporting Federal Civilian Employees. General Dynamics Information Technology develops and manages SOCs throughout federal civilian government. Serving 5,000 sites, these include SOCs for the U.S. Department of the Treasury, Internal Revenue Service and other Federal Agencies. General Dynamics Information Technology is the prime contractor for the IRS s Computer Security Incident Response Center, proactively protecting and responding to threats against the IRS s vast financial records and network since 2006. For the Federal Aviation Administration, we support its migration to a modern, secure communications infrastructure, including enterprise SOC support. The General Dynamics SOC. Serving tens of thousands of users, the General Dynamics SOC safeguards our federated enterprise environment, detecting and responding to threats against the company s cyber infrastructure and against company and customer data. Across General Dynamics Information Technology, our COTS-based tools process more than 60 million security events each day. Innovative event correlation reduces these to fewer than 50 actionable incidents. Our SOC also serves as a proving ground for our customers new security technologies and processes. Page 4

YOUR BEST DEFENSE FOR THE CYBER CHALLENGES AHEAD General Dynamics Information Technology is the leading provider of cyber security solutions to the U.S. Air Force, including operation of the Air Force SOC at Maxwell-Gunter AFB. General Dynamics Information Technology s strengths and innovation protect critical networks that are part of your federal enterprise today and lay the foundation for more resilient cyber defenses in the future. Cyber Security s Front Lines. Our expert workforce features hundreds of IA professionals with sweeping technical skills, in-depth training and industry-recognized certifications. Those serving the defense community typically have current DoD security clearances or higher. We are also one of the first companies to use NIST National Institute for Cybersecurity Education (NICE) principles for our internal cybersecurity workforce training. Meeting Critical Standards. Through our extensive A&A/C&A/RMF experience, we help you meet the latest security and IA standards. These include FISMA, DIACAP, NIST, ISO and NIACAP, as well as HIPAA, HITRUST and ISO 27799:2008 standards for healthcare. Our specialists monitor and work closely with government cyber security programs, regulatory agencies and standards organizations. We also help you develop continuous compliance monitoring to support timely, affordable audits, C&A and reporting. Respond Agilely, Defend Globally. Reduce your risk in an uncertain world. With cyber security solutions from General Dynamics Information Technology, you will respond agilely to the threats ahead as you defend your enterprise network around the globe. Page 5

THE FOUR BEST REASONS TO FIND OUT MORE. RELIABLE, REPEATABLE, MEASURABLE, AFFORDABLE. Page 6

Contact US Corporate Headquarters General Dynamics Information Technology 3211 Jermantown Road Fairfax, Virginia 22030 web: www.gdit.com/cyber 7286 6/1/16 General Dynamics Information Technology is an Equal Opportunity/ Affirmative Action Employer Minorities/Females/Protected Veterans/Individuals with Disabilities. 2016 General Dynamics Information Technology. All rights reserved. Some images courtesy of DoD.