Core Capabilities

You are here: Home \ Core Capabilities


  • Strategy, Policy, Principles, Tactics
  • Training and Education Program Planning
  • Risk Mitigation and Security Control Implementation
graphic symbol of a blue lock on computer circuit board
Hacker typing on a laptop and looking at computer screen

Insider Threat

  • Program Review, Policy Compliance, and Implementation
  • Privileged User Control Measures

Cloud Computing

  • Application Security
  • Identity Management
  • Personnel and Physical Security
cloud computing
Big Data

Data Analytics

  • Trend Analysis and Metric Development
  • Pattern Recognition Tools/Methods

Network Forensics

  • Signature and Non-Signature Based Analysis
  • Cyber Threat Awareness Support
security concept

National Security

  • Industrial Security
  • Personnel Security
  • Physical Security
  • Security Training
  • Counterterrorism