CMMI-DEV Level 3 Appraised. Welcome to Integrated Computer Solutions Inc. (ICS) Corporate Overview (Federal) Dave Dodds
|
|
- Susanna Hunt
- 5 years ago
- Views:
Transcription
1 CMMI-DEV Level 3 Appraised Welcome to Integrated Computer Solutions Inc. (ICS) Corporate Overview (Federal) Dave Dodds
2 Quick Overview An IT Services Company Established 1997 Veteran Owned Small Business Privately held $20M Annual Revenue 2016, No Debt, well capitalized Top Secret Facility Clearance 75% of Personnel are cleared Deploy Industry Best Practices Exceptional Rated Past Performance ICS Headquarters 60 Commerce St. Ste Montgomery, AL CAGE 0PDW2 DUNS
3 Our Markets 10% 22% 68% Commercial Vertical Markets State & Local Government Federal Government Insurance Healthcare Finance Manufacturing Retail Services Education Network Operations Insurance Healthcare Finance Environmental Governance Data Center Operations Information Assurance / Cyber Security SDLC / DevOps Network Engineering/Ops Seat Management
4 Applied Best Practices Our integrated approach of technical and project management is built on Certified Best Practices refined and tailored for each customer resulting in Exceptional customer satisfaction. Our Project Managers hold Project Management Professional Certifications. Our CMMI maturity level 3 appraisal provides assurance of the use of standard processes with significate performance confidence. IT services and lifecycle management is assured through the application of ITIL best practices. ISO 9001:2008 integrates a Quality Management System that consistently delivers customer satisfaction and continuous improvement.
5 Core Services Applications Infrastructure & Operations Security & Risk Management Agile Development Application Security Testing DevOps Web Applications Developing/ Managing Mobile Applications Legacy Fortification Legacy Sustainment Legacy Modernization ecommerce Development Data Center Operations Infrastructure and Operations Automation Agile Infrastructure Network Design and Planning Network Management Customer Experience Cloud Delivered Services Virtualization Vendor & Technology Evaluations Planning & Policy Development Cybersecurity Conducting Audits Vulnerability Assessment Risk Assessment Code Review Penetration Testing Incident Response Forensics Business Continuity Disaster Recovery
6 Federal Customers Contract Vehicles: Dept. of the Air Force Capabilities Integration Environment (CIE) Support Oracle Database Administration Dept. of Defense DISA CCC Enterprise Network Management DISA DECC-M IT Operations Support DISA Capacity Planning & Virtualization Support Services DISA DECC-M Computer and Infrastructure Support DISA Security Automation Toolkit Development DISA Forge.mil BPA US Air Force Netcents II US Navy Seaport-e DISA Encore II Dept. of Homeland Security EAGLE CIO Solutions & Partners 3 DISA SMC Montgomery Enclave Infrastructure Support Dept. of the Navy SPARWAR, CA product integration for the Defense Health Information Management System
7 State Customers Alabama Florida Dept. of Finance, Information Services Division Dept. of Industrial Relations Dept. of Mental Health State Courthouse State Personnel Board State Treasury Department Water Works & Sanitary Sewer, Montgomery Alabama A&M University Auburn University, Montgomery Jacksonville State University Tuskegee University University of South Alabama Arkansas Employment Security Department California Community Health Agency, Riverside County Delaware Office of Information Technology Services Georgia Georgia Technology Authority Agency for Workforce Innovation City of Sanibel Enterprise Information Technology Services Dept. of Children & Families Dept. of Environmental Protection (DEP) DEP Waste Management Division Dept. of Management Services Dept. of Revenue Dept. of State Florida Senate Hillsborough County Aviation Authority Lee County Port Authority Office of the State Courts Administrator Miami Dade College Tallahassee Community College Tallahassee Board of Education University of Florida Mississippi Mississippi State University Tennessee Department of Labor & Workforce Development
8 Commercial Customers A Standard of Excellence Through years of experience running global datacenters, enterprise systems management, global networking, and storage and application support, ICS can help prevent problems before they happen and give you back control of your information technology operations. It s what we do best. Education Miami Dade College Mississippi State University Troy University Tuskegee University Healthcare Baptist Health North Florida Medical Centers Dekalb Medical Center Finance Choicepoint Regions Bank Regulus Manufacturing Mack Trucks Rheem ThyssenKrupp Steel USA Insurance Blue Cross Blue Shield of AL Palomar Narragansett Bay Retail Publix Super Markets, Inc. Quiznos Services Verizon Federal, Inc. Unisys
9 Success Stories Adoption of AWS/milcloud 25% reduction in labor expense $750,000 reduction in host charges Use of Infrastructure and Operations Automation Tools Up time improvement from 74% to 99% Agile Software Development Accelerated Software Release Cycle from 3 months to 2 weeks. Contract Transition 100+ personnel, 97% of incumbents transitioned with no loss productivity. Technical Advisory Services In 7 months the Technical Advisory Board has engaged in 5 projects saving our DISA customer $155,100 Developed a Red Hat Satellite Server solution that avoided $250,000 expense.
10 Why ICS Promises Kept We deliver what we say Customer Mission Adoption Employee bonus system focuses employees on your mission. Application of Best Practices Integrated processes yield predictable performance Financially Sound No debt, mechanisms in place to expand Exploitation of State-of-the-Art Technology Data sharing, use of cloud, virtual meetings. Rapid Recruiting & High Retention Position fulfillment under 30 days, retention 97% Intentional Workforce Development Employee bonus system for learning Transparent Transitions Transitioned 100+ personnel no lost time. Exceptional Past Performance References Proof of delivered capability. Veteran Owned Small Business Fulfill agency / contract stipulations
11 Collaboration Opportunities Capabilities Hyper Converged Infrastructure Cyber Security additional depth and breath Account Affinity Department Homeland Security Coast Guard US Patent and Trade Office Department of Justice Army Navy If your growing out of being a Small Business and need a solid transition partner ICS can be your huckleberry
12 Contacts Dave Dodds, Rick Fleming John Demmon
QUIACLE TECHNOLOGY SOLUTIONS, INC. CLOUD SERVICES MANAGED SECURITY SERVICES
QUIACLE TECHNOLOGY SOLUTIONS, INC. CLOUD SERVICES MANAGED SECURITY SERVICES WHO WE ARE Founded in 2014 Headquartered in Frederick County, MD Registered in the System for Award Management (SAM) Women's
More informationIT-CNP, Inc. Capability Statement
Securing America s Infrastructure Security Compliant IT Operations Hosting Cyber Security Information FISMA Cloud Management Hosting Security Compliant IT Logistics Hosting 1 IT-CNP, Inc. is a Government
More informationTeam Capabilities and Specializations
Team Capabilities and Specializations X-Feds, The Small Business headquartered in San Diego, CA with satellite offices located in Virginia, Indiana, Charleston and the National Capital Region. Established
More informationSirius Security Overview
Sirius Security Overview Rob Hoisington IT Security Consultant www.siriuscom.com 8/18/2017 1 Rob Hoisington IT Security Consultant - CISSP, GLEG, GCIH Robert.Hoisington@siriuscom.com - 757.675.0101 Rob
More informationTRIAEM LLC Corporate Capabilities Briefing
TRIAEM LLC Corporate Capabilities Briefing 3/4/ 1 CORPORATE OVERVIEW CORPORATE VALUES MISSION STATEMENT SERVICES WORKFORCE EXPERIENCE CORPORATE CONTACTS 3/4/ 2 CORPORATE OVERVIEW TRIAEM is certified through
More informationDoug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017
Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure
More informationStennis Business Consortium. Marla J. Helveston August, 27th 2013
Stennis Business Consortium Marla J. Helveston August, 27th 2013 0 General Dynamics Overview $32 billion in annual revenue 95,000 employees worldwide Leading market positions in: Mission-critical information
More informationShared Web Services: The New Frontier in Government
Shared Web Services: The New Frontier in Government TASSCC Technology Education Conference Austin, Texas March 26, 2009 Bill Chambers VP, Government Consulting Services Objectives The primary objective
More informationIT Consulting and Implementation Services
PORTFOLIO OVERVIEW IT Consulting and Implementation Services Helping IT Transform the Way Business Innovates and Operates 1 2 PORTFOLIO OVERVIEW IT Consulting and Implementation Services IT is moving from
More informationHOW TO DO BUSINESS WITH Lockheed Martin. Copyright 2017, Lockheed Martin Corporation. All rights reserved 0000.PPT 8/8/2017 1
HOW TO DO BUSINESS WITH Lockheed Martin Copyright 2017, Lockheed Martin Corporation. All rights reserved 0000.PPT 8/8/2017 1 Vision Lockheed Martin is the Leading Aerospace and Global Security Company,
More information79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90
th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither
More informationSolutions Technology, Inc. (STI) Corporate Capability Brief
Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned
More informationCalifornia Cybersecurity Integration Center (Cal-CSIC)
California Cybersecurity Integration Center (Cal-CSIC) Agenda Mission and Scope Whole of State Government Approach Where is the Cal-CSIC? Cal-CSIC Partners Attaining Cyber Maturity in Parallel Machine
More informationIntelligence & Security Overview
Intelligence & Security Overview 2014 1 Our Mission Employees: ~10,000 84% cleared Headquarters: McLean, VA Mission: BAE Systems Intelligence & Security enables the U.S. government to transform data into
More informationSecuring the Internet of Things (IoT) at the U.S. Department of Veterans Affairs
Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs Dominic Cussatt Acting Deputy Assistant Secretary / Chief Information Security Officer (CISO) February 20, 2017 The Cyber
More informationTransformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018
Transformation in Technology Barbara Duck Chief Information Officer Investor Day 2018 Key Takeaways 1Transformation in Technology driving out cost, supporting a more technologyenabled business Our new
More informationPROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY
PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY OUR MISSION Make the digital world a sustainable and trustworthy environment
More informationSupporting the Cloud Transformation of Agencies across the Public Sector
SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationDell helps you simplify IT
Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending
More informationAccenture Texas. Delivering High Performance in Health & Public Service
Accenture Texas Delivering High Performance in Health & Public Service Global reach. Texas touch. Accenture is a global management consulting, technology services and outsourcing company, with more than
More informationStreamlined FISMA Compliance For Hosted Information Systems
Streamlined FISMA Compliance For Hosted Information Systems Faster Certification and Accreditation at a Reduced Cost IT-CNP, INC. WWW.GOVDATAHOSTING.COM WHITEPAPER :: Executive Summary Federal, State and
More informationThe Journey Towards Serving a Digital Government
The Journey Towards Serving a Digital Government Presenter: Gilles Dufour, DG, Analytics, Benchmarking & Transformation Program Office Barry Rodger, Director, Costing Operations Date: November 23, 2018
More informationStrengthening Capacity in Cyber Talent sans.org/cybertalent
SANS Security Awareness Summit August 4th, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus
More informationDefense in Depth Security in the Enterprise
Defense in Depth Security in the Enterprise Mike Mulville SAIC Cyber Chief Technology Officer MulvilleM@saic.com Agenda The enterprise challenge - threat; vectors; and risk Traditional data protection
More informationOur Mission: To provide technology resources for the County and set the vision for future technology investments
Jack Belcher, Chief Information Officer 2100 CLARENDON BLVD., SUITE 612, ARLINGTON, VA 22201 703-228-3220 cio@arlingtonva.us Our Mission: To provide technology resources for the County and set the vision
More informationBalancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld
Balancing Compliance and Operational Security Demands Nov 2015 Steve Winterfeld What is more important? Compliance with laws / regulations Following industry best practices Developing a operational practice
More informationHISTORY: ADMINISTRATION AND COST CONTROL:
HISTORY: SofiaITC was incorporated in 2012 as a Veteran Owned Small Business (VOSB) Enterprise IT and Cybersecurity Solutions and Services provider by Mr. James Quilty following 21 years of combined Military
More informationOur Mission: To provide technology resources for the County and set the vision for future technology investments
Jack Belcher, Chief Information Officer 2100 CLARENDON BLVD., SUITE 612, ARLINGTON, VA 22201 703-228-3220 cio@arlingtonva.us Our Mission: To provide technology resources for the County and set the vision
More informationNYDFS Cybersecurity Regulations
SPEAKERS NYDFS Cybersecurity Regulations Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 lsotto@hunton.com www.huntonprivacyblog.com March 9, 2017 The Privacy Team at Hunton & Williams Over 30 privacy
More informationNew York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines
New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities
More informationExhibit to Agenda Item #3
Exhibit to Agenda Item #3 Special SMUD Board of Directors Meeting Tuesday, scheduled to begin at 5:30 p.m. Customer Service Center, Rubicon Room Powering forward. Together. Physical Security Audit observations
More informationInformation Systems, Human Resource Management CalsonicKansei x x x x Human Resources, Marketing
College of Business Citizenship Requirements Position Types U.S. Perm. Undergraduate Majors Graduate Majors/Programs Company Name Citizen Res. F-1 Visa Co-ops Interns Career 3M x x x x, Supply AL Air National
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationOperations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ
Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016
More informationCybersecurity and Hospitals: A Board Perspective
Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,
More informationEmbracing Business Development: Marketing Your Company in the Federal Marketplace. Ameeta Soni VP, Marketing & Business Development VFA, Inc.
Embracing Business Development: Marketing Your Company in the Federal Marketplace Ameeta Soni VP, Marketing & Business Development VFA, Inc. About VFA Leading provider of software and services for facilities
More informationCybersecurity Risk Management:
Cybersecurity Risk Management: Building a Culture of Responsibility G7 ICT and Industry Multistakeholder Conference September 25 2017 Adam Sedgewick asedgewick@doc.gov Cybersecurity in the Department of
More informationEmerging Technologies The risks they pose to your organisations
Emerging Technologies The risks they pose to your organisations 10 June 2016 Digital trends are fundamentally changing the way that customers behave and companies operate Mobile Connecting people and things
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationNYDFS Cybersecurity Regulations: What do they mean? What is their impact?
June 13, 2017 NYDFS Cybersecurity Regulations: What do they mean? What is their impact? Gus Coldebella Principal, Boston Caroline Simons Principal, Boston Agenda 1) Overview of the new regulations 2) Assessing
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationGOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES
GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES INSIGHTS FROM PUBLIC SECTOR IT LEADERS DISCOVER NEW POSSIBILITIES. New network technology is breaking down barriers in government offices, allowing for
More informationThe U.S. Manufacturing Extension Partnership - MEP
The U.S. Manufacturing Extension Partnership - MEP Roger D. Kilmer Director, MEP National Institute of Standards and Technology (NIST) U.S. Department of Commerce roger.kilmer@nist.gov 301-975-5020 http://www.nist.gov/mep/
More informationRisk Advisory Academy Training Brochure
Academy Brochure 2 Academy Brochure Cyber Security Our Cyber Security trainings are focused on building your internal capacity to leverage IT related technologies more confidently and manage risk and uncertainty
More informationGreen Treatment Center
Green Treatment Center IT Strategic Goals and Objectives: 2017-2019 Technology Plan The Department s IT strategies for the next four years are grounded in legislative and regulatory drivers that inform
More informationFederal Market & Strategy Overview for Investors
Federal Market & Strategy Overview for Investors Presented by Venkatapathi Puvvada (PV) Senior Vice President/President, Unisys Federal September 18, 2017 Disclaimer Statements made by Unisys during today
More informationSALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually
SALARY $49.72 - $72.54 Hourly $3,977.88 - $5,803.27 Biweekly $8,618.75 - $12,573.75 Monthly $103,425.00 - $150,885.00 Annually ISSUE DATE: 03/21/18 THE POSITION DIRECTOR OF CYBER SECURITY OPEN TO THE PUBLIC
More information2017 Category Management Conference
2017 Category Management Conference Category Management: Acting as One for Better Mission Delivery WEDNESDAY, MARCH 1, 2017 RENAISSANCE WASHINGTON 7:0 AM 4:00 PM Administrative Shared Services Beth Angerman,
More informationAviation & Airspace Solutions MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING PERFORMANCE
Aviation & Airspace Solutions MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING PERFORMANCE Enabling Aircraft Safety With Comprehensive Technology MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING
More informationSecurity and Privacy Governance Program Guidelines
Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by
More informationYour Challenge. Our Priority.
Your Challenge. Our Priority. Building trust and Confidence. When Federal managers and military leaders face tough challenges in cyber, data collection & analytics, enterprise IT or systems and software
More informationGain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services
Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs
More informationOpening Doors to Cyber and Homeland Security Careers
Opening Doors to Cyber and Homeland Security Careers Opening Doors to Cyber and Homeland Security Careers Today s Presenters: Frederic Lemieux, Ph.D. Professor and Program Director, Cybersecurity Strategy
More informationData Security and Privacy Principles IBM Cloud Services
Data Security and Privacy Principles IBM Cloud Services 2 Data Security and Privacy Principles: IBM Cloud Services Contents 2 Overview 2 Governance 3 Security Policies 3 Access, Intervention, Transfer
More informationVirtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services
Virtustream Managed Services Drive value from technology investments through IT management solutions Tim Calahan, Manager Managed Services Virtustream Managed Services Your partner in delivering IT as
More informationENDPOINT SECURITY STORMSHIELD PROTECTION FOR WORKSTATIONS. Protection for workstations, servers, and terminal devices
ENDPOINT SECURITY STORMSHIELD PROTECTION FOR WORKSTATIONS Protection for workstations, servers, and terminal devices Our Mission Make the digital world a sustainable and trustworthy environment while ensuring
More informationGlobal Security Consulting Services, compliancy and risk asessment services
Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment
More informationDepartment of Management Services REQUEST FOR INFORMATION
RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President
More informationSystems Engineering: MITRE & SERC D r. J. P r o v i d a k e s D i r e c t o r, S E Te c h C e n t e r
Systems Engineering: MITRE & SERC D r. J. P r o v i d a k e s D i r e c t o r, S E Te c h C e n t e r The SERC-MITRE Doctoral Fellows Program collaboration presents the unique opportunity to transition
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationFuture Shifts in Enterprise Architecture Evolution. IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013
Future Shifts in Enterprise Architecture Evolution IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013 Agenda Terminology & Definitions Evolution to Cloud Cloud Adoption Appendix 2013
More informationCyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services
Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services Issued August 21, 2015 Response to Request for Information Prepared for: State of Florida Purchasing
More informationThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce
More informationBackground FAST FACTS
Background Terra Verde was founded in 2008 by cybersecurity, risk and compliance executives. The founders believed that the market needed a company that was focused on using security, risk and compliance
More informationKeeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent
Keeping Your SOCs Full May 26, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus on theoretical
More informationIT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18
Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are
More information10 Cloud Myths Demystified
10 Cloud s Demystified The Realities for Digital Healthcare Transformation It s a challenging time for the healthcare industry, with changing regulations, consolidation and the consumerization of healthcare
More informationSTUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences
STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students
More informationSRS Overview. Dave Hepner. Looking toward the future of the Savannah River Site
SRS Overview Looking toward the future of the Savannah River Site Dave Hepner Department of Energy-Savannah River Director, Acquisition Operations Division Savannah River Site March 19, 2012 SRS: We know
More informationSIEM: Five Requirements that Solve the Bigger Business Issues
SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered
More informationUNISYS FEDERAL CONTRACT VEHICLES
UNISYS FEDERAL CONTRACT VEHICLES SECURING OUR COUNTRY WITH BEST-IN-CLASS SERVICE DELIVERY 1 Transforming citizen-centric services through innovative solutions Supporting more than 300 government organizations
More informationPinellas County. Business Technology Services. BTS Board Meeting April 19, 2018
Pinellas County Business Technology Services BTS Board Meeting April 19, 2018 Agenda 1. Call to Order (Commissioner Welch, Chair) 2. Designation of Voting Members (Commissioner Welch, Chair) 3. Action
More informationNW NATURAL CYBER SECURITY 2016.JUNE.16
NW NATURAL CYBER SECURITY 2016.JUNE.16 ADOPTED CYBER SECURITY FRAMEWORKS CYBER SECURITY TESTING SCADA TRANSPORT SECURITY AID AGREEMENTS CONCLUSION QUESTIONS ADOPTED CYBER SECURITY FRAMEWORKS THE FOLLOWING
More informationDISA CLOUD CLOUD SYMPOSIUM
DISA CLOUD P L A Y B O O K CLOUD SYMPOSIUM DISA Cloud Adoption Cycle LEARN CHOOSE BUY CONFIGURE TRANSITION UTILIZE CLOUD CONSUMER What Mission Partners Should Know and Do Cloud Policies Goals (Fit, Leverage,
More information2017 RIMS CYBER SURVEY
2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the
More information2017 Cyber Incident & Breach Readiness Webinar Will Start Shortly
2017 Cyber Incident & Breach Readiness Webinar Will Start Shortly please download the guide at https://otalliance.org/incident 2017 Cyber Incident & Breach Readiness Webinar Craig Spiezle Executive Director
More informationUpdate on the Government of Canada s Information Technology Transformation Plan
Update on the Government of Canada s Information Technology Transformation Plan Presentation to the Information Technology Infrastructure Roundtable June 27, 2016 Peter Bruce, Senior Assistant Deputy Minister,
More information21ST century enterprise. HCL Technologies Presents. Roadmap for Data Center Transformation
21ST century enterprise HCL Technologies Presents Roadmap for Data Center Transformation june 2016 21st Century Impact on Data Centers The rising wave of digitalization has changed the way IT impacts business.
More informationSTRATEGIC PLAN. USF Emergency Management
2016-2020 STRATEGIC PLAN USF Emergency Management This page intentionally left blank. Organization Overview The Department of Emergency Management (EM) is a USF System-wide function based out of the Tampa
More informationISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION
ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project
More informationCybersecurity Session IIA Conference 2018
www.pwc.com/me Cybersecurity Session IIA Conference 2018 Wael Fattouh Partner PwC Cybersecurity and Technology Risk PwC 2 There are only two types of companies: Those that have been hacked, and those that
More informationLifecycle Management (LCM)
Lifecycle Management (LCM) Presented by: John Sorensen Dave Trice PRESENTATION TITLE 2017 MHI Copyright claimed for audiovisual works and sound recordings of seminar sessions. All rights reserved. What
More informationCybersecurity and Data Protection Developments
Cybersecurity and Data Protection Developments Nathan Taylor March 8, 2017 NY2 786488 MORRISON & FOERSTER LLP 2017 mofo.com Regulatory Themes 2 A Developing Regulatory Environment 2016 2017 March CFPB
More informationCYBER APPRENTICESHIP. Dr. Leigh Armistead, President
CYBER APPRENTICESHIP Dr. Leigh Armistead, President 1 OVERVIEW Peregrine Technical Solutions, LLC. (Peregrine) is a SBA certified 8(a) business with core competencies in IT security, IA and cyber warfare.
More informationIT Managed Services. Schedule 1 Specification 11/07/18
` IT Managed Services Schedule 1 Specification 11/07/18 IT Managed Service ITT Schedule 1 Specification Table of Contents 1.0 Introduction... 2 1.1 Overview... 2 2.0 Scope... 2 3.0 Vendor Response Requirements...
More informationREALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware
REALIZE YOUR DIGITAL VISION with Digital Private Cloud from Atos and VMware Today s critical business challenges and their IT impact Business challenges Maximizing agility to accelerate time to market
More informationhcloud Deployment Models
hcloud Deployment Models Drew Dietrich Director, Oracle Managed Cloud Services 1 The Safe Harbor The following is intended to outline our general product direction. It is intended for information purposes
More informationCybersecurity Overview
Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where
More informationCYBERSECURITY AND THE MIDDLE MARKET
CYBERSECURITY AND THE MIDDLE MARKET The Importance of Cybersecurity and How Middle Market Companies Manage Cyber Risks IN COLLABORATION WITH 2 Concerns about cybersecurity are not matched by plans. IMPORTANCE
More informationDefense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility
Strategic Plan 2020 Addendum, April 2017 Our Agency, Our Mission, Our Responsibility [2] DSS Strategic Plan Addendum 2020 Addendum The DSS Strategic Plan 2020 is designed to support the agency s continuous
More informationSymantec Data Center Transformation
Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments
More informationDepartment of Defense Fiscal Year (FY) 2014 IT President's Budget Request Defense Media Activity Overview
Mission Area Department of Defense Overview Business System Breakout Appropriation BMA 0.163 Total 24.846 Defense Business Systems 0.163 All Other Resources 24.683 EIEMA 24.683 FY 2014 ($M) FY 2014 ($M)
More informationCyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber
CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber Initiatives 30 January 2018 1 Agenda Federal Landscape Cybersecurity
More informationSage Data Security Services Directory
Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time
More informationWhy you should adopt the NIST Cybersecurity Framework
Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive
More informationCybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016
Cybersecurity: Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda Key Risks Incorporating Internal Audit Resources Questions 2 San Francisco
More informationISO/ IEC (ITSM) Certification Roadmap
ISO/ IEC 20000 (ITSM) Certification Roadmap Rasheed Adegoke June 2013 Outline About First Bank Motivations Definitions ITIL, ISO/IEC 20000 & DIFFERENCES ISO/ IEC 20000 Certification Roadmap First Bank
More information