Who we are. Trusted. ManTech International Corporation. Our Customers. What We Do

Size: px
Start display at page:

Download "Who we are. Trusted. ManTech International Corporation. Our Customers. What We Do"

Transcription

1

2 Who we are is a global provider of technical, IT, and cyber services in support of U.S. national security objectives. After more than 40 years, we still adhere to the simple, no-nonsense values on which we were founded, focusing on the mission objectives of the government agencies and military forces that we serve. As our customers needs have expanded and diversified, we have diversified our workforce solutions. Today, more than 10,000 highly skilled ManTech employees are at work throughout the United States and worldwide - working side by side with the people who keep our nation safe. In fact, more than 2,000 are deployed in remote, austere, and hostile environments in support of our soldiers on the battlefield. We owe our growth to the quality services we deliver and the quality people we assign to each mission. More than 70 percent of our employees hold active security clearances. Trusted ManTech works as a partner to government in national security, space programs, and program administration. We can quickly deploy skilled technicians virtually anywhere in the world, including remote, austere, and hostile environments, and we mesh seamlessly with our government customers. Our Customers ManTech supports more than 1,000 active contracts with more than 40 different federal agencies, including: All branches of the Armed Forces Departments of Defense, State, Homeland Security and Energy Department of Justice and the Federal Bureau of Investigation Intelligence Community NOAA and NASA Other U.S. federal government agencies What We Do Mission, Cyber and Technology Solutions Systems Engineering and Advanced Technology Technical Services 1

3 What we do for our Customers Mission, Cyber and Technology Solutions We tackle some of the most challenging cyber security and information technology problems facing our nation, including identifying and neutralizing external cyber attacks; managing Security Operations Centers (SOCs); developing robust insider threat detection programs; providing complete program protection; developing actionable intelligence and creating enterprise risk management programs. Cyber Defense Secure, 24/7 SOC remote monitoring or building from the ground up, government wide information access Fast, effective incident response, analysis, investigations and evidence collection Enhanced information security compliance through policy and training Turning data into actionable intelligence across agencies Cyber Security and Operations Complete program protection and security Integrated security methodology Science and technology policy development R&D for advanced Computer Network Operations (CNO) gamechanging tactics and techniques Complete forensics and exploitation solutions for tomorrow s challenges SIGINT and Cyber Operations Critical support for intelligence mission operations Collaboration tools and analysis to support the intelligence lifecycle Complete CNO monitoring and protection The right people and tools to support a wide range of cyber operations Enterprise IT Controlled access to information resources Planning and design of systems built for success Integration of existing resources for efficiency Customized secure social networking solution that facilitate collaboration Technical experts to support modernization and integration Successful 24/7 Special Operations Center (SOC) Support ManTech s 24/7 cyber security support to the FBI s SOC includes 24/7 intrusion detection monitoring, security engineering, incident identification and response, vulnerability assessment and penetration testing, cyber threat analysis, and specialized training. This best-in-class example our largest cyber security SOC award is being replicated by other federal agencies. We also provide SOC support to the U.S. Department of Agriculture, Executive Office of U.S. Attorneys, Department of Justice, FBI Enterprise SOC, Naval Criminal Investigative Service, and Department of Defense. Cutting-edge Document and Media Exploitation Our employees support the information technology and forensics mission of the National Media Exploitation Center (NMEC), the Center of Excellence for document and media exploitation, cyber forensics, biometrics, and linguistic support to the intelligence community and the Warfighter. Critical Support to the Nation s Law Enforcement Agencies We were chosen to run the technical research and development arm of the DOJ s National Institute of Justice (NIJ), the Sensor, Surveillance and Biometric Technologies Center of Excellence. Relying on our expertise in operational law enforcement, tactical biometrics and technology assessment, we are testing, evaluating, and introducing the best new technologies to our nation s law enforcers. 2 3

4 What we do for our Customers Systems Engineering and Advanced Technology The ManTech Enterprise Framework integrates the full spectrum of project management, systems engineering, and acquisition practices necessary to effectively manage a project or system over its lifecycle. We apply a multidisciplinary approach to develop and build efficient custom systems, applications, tools, and processes; improve system designs through mission assurance assessments; and develop and execute environmentally-friendly, sustainable strategies and compliance programs. Systems Engineering and Integration Development of large-scale systems and acquisition processes from concept to deployment System architecture alignnment with mission requirements Identifcation, development, and management of system requirements Information Technology/Information Systems Design, build, testing, and maintenance of complex, secure information systems Customized, advanced, and interactive training applications Real-time, custom software application development Support and modernization of legacy IT systems Modeling, Simulation, Studies and Analysis Engineering, theatre, campaign and force-on-force modeling and simulation Susceptibility, vulnerability, and survivability assessments and analyses Provide IR/EO, RF and acoustic sensor analysis Mission Assurance Full spectrum assistance for launch site support of space lift and satellite systems Independent assessments, audits, and surveillance of ongoing program-related activities Quality control to ensure prime contractor safety and reliability Provide systems and launch safety engineering Environmental, Range, and Sustainability Services Environmental planning, policy development, and regulatory compliance Planning for sustainable national security infrastructure Sustainability systems analysis and policy development Support for Successful Space Shuttle Launch Operations ManTech proudly supports current and future space launch operations for the U.S. Air Force Launch and Range Systems Wing. Systems Engineering, Program Management and Training for the Department of Homeland Security s (DHS) Secure Border Initiative We conduct systems engineering, program management support services, and education and training-related tasks for DHS s Secure Border Initiative Program Office, which protects against and prevents terrorist attacks and other transnational crimes. Integration and Systems Engineering Support, Product Group 12, Marine Corps Systems Command ManTech provides critical support to the development and integration of tactical systems for Marine Corps operating forces. In support of these efforts, we provide the subject matter expertise and the engineering environment necessary to quickly address difficult challenges. 4 5

5 What we do for our Customers Technical Services ManTech support to the warfighter is based on our commitment to the mission. We fulfill this commitment by providing a professional, skilled team with the experience, capability, and agility to meet the critical needs of the warfighter anytime, anywhere. We provide rapidly deployed logistics, maintenance and sustainment, communications infrastructure support, and IT services for C4ISR and other systems worldwide. Integrated Logistics Services Management of critical systems in any type of environment worldwide including remote, austere, and hostile locales Increased operational readiness for critical and life-sustaining counter improvised explosive device vehicles and systems Streamlined supply chain systems including delivery, development, and management Field and classroom training to increase command self-sufficiency Global property readiness, records, accountability and tracking systems to ensure complete visibility Maintenance and Sustainment Services Supply operations and support services from logistics, operations and maintenance to systems integration Wheeled vehicle maintenance, repair and RESET Regional Support Centers that provide infrastructure and facility operations around the world including systems and network troubleshooting; maintenance, repair and installation; and integration and testing of electrical and mechanical equipment designed for vehicular, airborne, and portable platforms Communications and Infrastructure Support Secure communications systems and network infrastructure engineering, design, procurement, installation and maintenance Operation and maintenance of command, control communications computers and intelligence (C4I) for deployed units in hostile environments Enabling U.S. Readiness Anytime, Anywhere ManTech engineers and technicians have supported every major U.S. conflict since including missions to Kuwait, Iraq, and Afghanistan. Our employees make sure that intelligence and electronic warfare systems and C4SIR equipment are in good working order; enable communication in hostile environments; and maintain, transport, track, and secure mission-critical equipment worldwide. 24/7 Logistics Support for International Military Operations ManTech maintains and repairs mineresistant, ambush-protected vehicles (MRAP) and MRAP all-terrain vehicles predominantly in Iraq and Afghanistan on behalf of the U.S. Army. We also provide integrated logistics support services for the U.S. Army Sustainment Command in the Pacific region, to include deployment training equipment, theater-provided equipment, and supply support activity. 6 Systems Engineering and Information Technology Support Global IT modernization of classified and unclassified networks Secure distribution and shipment of IT equipment Secure connection, data storage, and integration in a variety of operational and physical security platforms Hardware/software development, integration, and T&E, including combat system failure analysis, and joint interoperability testing Cradle-to-grave aerospace engineering from concept definition to hardware integration Supply aircraft and space materials and products Forward deployed biometrics systems, training, and support Technology Acquisition, Development, and Support Systems acquisition support including performance and product evaluation Systems engineering, development, and integration in nonpermissive environments Program management, fielding, and training to support CONUS and OCONUS operations Specialized Communications Design and Support Our employees provide mission-critical communications solutions for deployed U.S. forces using our extensive communications capabilities and our in-country support experience. We design, install, and maintain an integrated communications system that provides continuous cell phone coverage for operational forces in Afghanistan. The solution includes permanent and mobile cell towers located on forward-operating bases to provide uninterrupted communications that are critical to our forces in remote regions. 7

6 Why Choose ManTech? We believe ManTech is the most efficient provider of mission-critical services in the federal government marketplace. We have earned the trust and confidence of our customers, employees, and investors. This has translated into a track record of customer retention and growth, employee loyalty and recognition, and shareholder value. Customer-driven Our primary customer is the U.S. federal government. In today s increasingly dangerous world the need for sophisticated intelligence gathering and information sharing activities is greater than ever. The dynamic threat America faces from shootings to car bombs to simultaneous suicide attacks to in-flight bombings of passenger aircraft calls for reliance on companies like ManTech to help the intelligence, law enforcement, and defense communities execute their mission. Employee-centered For more than 10,000 highly skilled employees, ManTech is their employer of choice. In 2010, we added over 2,000 new hires a record number and we are proud that half of our new recruits are military veterans. We target candidates who have served in the military or as civilian experts in the intelligence community and Department of Defense, as well as experts in the technology disciplines. Our partnership with the U.S. Army Reserve allows both organizations to identify young people interested in serving the nation and pursuing a career in mission-critical technologies. A robust employee referral program helps us identify and recruit topquality candidates, and our market competitive benefits and opportunities for professional development and growth continue to attract a stellar cadre of applicants. ManTech attracts superior professionals and emphasizes employee retention, and we have reduced our voluntary attrition rate in each of the last two years. We offer: Challenging assignments that support our country and fulfill our clients mission-critical needs Job security, coupled with competitive compensation and incentive plans Opportunities for professional growth and development through ManTech University, our in-house corporate learning and professional development arm A Career Mobility Program that helps identify new career opportunities for active employees Matched employee contributions to charities that provide relief, and engagement in events that promote wellness and advance health Investor-focused As a premier provider of technology and engineering services and solutions to the federal government market, our strategy centers on growing our business strategically and profitably. The pillars of our strategy are: Expand within our national security base through a holistic approach that capitalizes on our global footprint and existing customer base to cross-sell our broad array of solutions Target high-growth segments of the market, in particular cyber security, information assurance, and C4ISR lifecycle support, and fast growing areas such as smart power and border security Leverage our competitive advantages, including our experience on mission-critical technology solutions, our global presence, and the reputation ManTech has earned as a trusted partner to the intelligence and defense communities Pursue strategic acquisitions that broaden our domain expertise and service offerings, with particular focus on building our core offerings in national security and homeland defense; augmenting our cyber security capability; and diversifying into U.S. federal civilian agencies Maintain our relentless focus on efficiency by offering a strong value proposition to our customers that identifies ManTech as a costcompetitive provider that is wellpositioned in the marketplace Attract and retain highly dedicated and cleared personnel to build the key managers and technical staff needed to meet our growth objectives 8 9

7

Your Challenge. Our Priority.

Your Challenge. Our Priority. Your Challenge. Our Priority. Building trust and Confidence. When Federal managers and military leaders face tough challenges in cyber, data collection & analytics, enterprise IT or systems and software

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Integrated C4isr and Cyber Solutions

Integrated C4isr and Cyber Solutions Integrated C4isr and Cyber Solutions When Performance Matters L3 Communication Systems-East provides solutions in the C4ISR and cyber markets that support mission-critical operations worldwide. With a

More information

Continuous protection to reduce risk and maintain production availability

Continuous protection to reduce risk and maintain production availability Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour

More information

News Release U.S. ARMY SUSTAINMENT COMMAND. Success of Southwest Asia Support Branch Leads to Expansion of Reachback Contracting

News Release U.S. ARMY SUSTAINMENT COMMAND. Success of Southwest Asia Support Branch Leads to Expansion of Reachback Contracting News Release U.S. ARMY SUSTAINMENT COMMAND July 7, 2009 Success of Southwest Asia Support Branch Leads to Expansion of Reachback Contracting By Jake M. Adrian Rock Island Contracting Center ROCK ISLAND,

More information

Principles for a National Space Industry Policy

Principles for a National Space Industry Policy Principles for a National Space Industry Policy Commonwealth of Australia 2011 DIISR 11/144 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced

More information

Defence services. Independent systems and technology advice that delivers real value. Systems and Engineering Technology

Defence services. Independent systems and technology advice that delivers real value. Systems and Engineering Technology Defence services Independent systems and technology advice that delivers real value Systems and Engineering Technology Frazer-Nash Consultancy Working in the UK and internationally, Frazer-Nash is making

More information

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS

SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS SYNERGISTIC WARFARE COMMUNICATION SOLUTIONS Tactical Communications & Networking Wireless / wired networks Full spectrum of tactical communications Tactical datalinks Radio ancillaries and accessories

More information

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Testimony Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Defending Our Democracy: Building Partnerships to Protect America

More information

Be prepared! Secure communication leads to successful command.

Be prepared! Secure communication leads to successful command. Be prepared! Secure communication leads to successful command. Welcome to RUAG Defence As a technology partner, RUAG Defence helps armed forces carry out their operations successfully. We ensure that response

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

TECHNOLOGY FOR A SAFER WORLD

TECHNOLOGY FOR A SAFER WORLD DESENSE & SECURITY TECHNOLOGY FOR A SAFER WORLD We implement our expertise in the five domains of Defense: Land, Sea, Air, Space and Cyberspace indracompany.com DEFENSE SYSTEMS Indra offers an integrated

More information

The Perfect Storm Cyber RDT&E

The Perfect Storm Cyber RDT&E The Perfect Storm Cyber RDT&E NAVAIR Public Release 2015-87 Approved for public release; distribution unlimited Presented to: ITEA Cyber Workshop 25 February 2015 Presented by: John Ross NAVAIR 5.4H Cyberwarfare

More information

Section One of the Order: The Cybersecurity of Federal Networks.

Section One of the Order: The Cybersecurity of Federal Networks. Summary and Analysis of the May 11, 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Introduction On May 11, 2017, President Donald

More information

SDDC CAMPAIGN PLAN OVERVIEW MILITARY SURFACE DEPLOYMENT AND DISTRIBUTION COMMAND

SDDC CAMPAIGN PLAN OVERVIEW MILITARY SURFACE DEPLOYMENT AND DISTRIBUTION COMMAND RF Y SU ACE D AR E IT MI L CAMPAIGN PLAN OVERVIEW R.E.A.D.Y. 2017-2020 Responsive to the Warfighter, Expeditionary - Fight Tonight, Agile Business Process-Audit Compliant, Delivering Readiness, Your Joint

More information

WHITE PAPER ON TEKGARD S HEATING, VENTILATION AND AIR-CONDITIONING CAPABILITIES

WHITE PAPER ON TEKGARD S HEATING, VENTILATION AND AIR-CONDITIONING CAPABILITIES Innovative Solutions for Extreme Conditions WHITE PAPER ON TEKGARD S HEATING, VENTILATION AND AIR-CONDITIONING CAPABILITIES We Work Everywhere So You Can Work Anywhere Prepared By: Joshua M. Carson Tekgard,

More information

CYBER RESILIENCE & INCIDENT RESPONSE

CYBER RESILIENCE & INCIDENT RESPONSE CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable

More information

STRATEGIC PLAN

STRATEGIC PLAN STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology

More information

PROFILE: ACCESS DATA

PROFILE: ACCESS DATA COMPANY PROFILE PROFILE: ACCESS DATA MARCH 2011 AccessData Group provides digital investigations and litigation support software and services for corporations, law firms, law enforcement, government agencies

More information

Maintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery

Maintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery Maintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery Dave Komendat Chief Security Officer The Boeing Company What We Do Today Design, assemble and support

More information

DHS Cybersecurity: Services for State and Local Officials. February 2017

DHS Cybersecurity: Services for State and Local Officials. February 2017 DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated

More information

Defense Engineering Excellence

Defense Engineering Excellence Defense Engineering Excellence Kristen J. Baldwin Principal Deputy Office of the Deputy Assistant Secretary of Defense for Systems Engineering, OUSD(AT&L) 18th Annual NDIA Systems Engineering Conference

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

Sage Data Security Services Directory

Sage Data Security Services Directory Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time

More information

Cyber Security School

Cyber Security School Cyber Cyber Security School FUTURE PROOF Y SECURITY TALENT "The UK needs to tackle the systemic issues at the heart of the Cyber skills shortage..." National Cyber Security Strategy 2016-2021, HM Government

More information

TRIAEM LLC Corporate Capabilities Briefing

TRIAEM LLC Corporate Capabilities Briefing TRIAEM LLC Corporate Capabilities Briefing 3/4/ 1 CORPORATE OVERVIEW CORPORATE VALUES MISSION STATEMENT SERVICES WORKFORCE EXPERIENCE CORPORATE CONTACTS 3/4/ 2 CORPORATE OVERVIEW TRIAEM is certified through

More information

U.S. Department of Homeland Security Office of Cybersecurity & Communications

U.S. Department of Homeland Security Office of Cybersecurity & Communications U.S. Department of Homeland Security Office of Cybersecurity & Communications Council of State Governments Cybersecurity Session November 3, 2017 Cybersecurity & Communications (CS&C) CS&C s Mission ensure

More information

Background FAST FACTS

Background FAST FACTS Background Terra Verde was founded in 2008 by cybersecurity, risk and compliance executives. The founders believed that the market needed a company that was focused on using security, risk and compliance

More information

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014 JSC THE JUSTICE & SAFETY CENTER Snapshot 2014 The Justice & Safety Center (JSC) is comprised of a team of faculty and staff professionals at Eastern Kentucky University (EKU) dedicated to strengthening

More information

Smart Data Center Solutions

Smart Data Center Solutions Smart Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing,

More information

Grow Your Services Business

Grow Your Services Business Grow Your Services Business Cisco Services Channel Program One Experience. Expanding Opportunities. Expand Your Services Practice More Profitably Together with Cisco Our customers face tough business

More information

HP Fortify Software Security Center

HP Fortify Software Security Center HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)

More information

Air Force Mission: Air Power for Australia s interests. Air Force Values: Respect Excellence Agility Dedication Integrity Teamwork

Air Force Mission: Air Power for Australia s interests. Air Force Values: Respect Excellence Agility Dedication Integrity Teamwork Air Force Vision: Air Force will provide the most rapid, effective and responsive military options for the Australian Government to achieve national objectives within our region and globally. Air Force

More information

Advanced Concepts & Technologies International, LLC

Advanced Concepts & Technologies International, LLC Advanced Concepts & Technologies International, LLC Advanced Concepts and Technologies International, L.L.C. (ACT I) has been providing solutions for high profile military programs such as the U.S. Navy

More information

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats

More information

Aviation & Airspace Solutions MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING PERFORMANCE

Aviation & Airspace Solutions MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING PERFORMANCE Aviation & Airspace Solutions MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING PERFORMANCE Enabling Aircraft Safety With Comprehensive Technology MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING

More information

TSA/FTA Security and Emergency Management Action Items for Transit Agencies

TSA/FTA Security and Emergency Management Action Items for Transit Agencies TSA/FTA Security and Emergency Management Action Items for Transit Agencies AACTION ITEM LIST Management and Accountability 1. Establish Written System Security Programs and Emergency Management Plans:

More information

to Enhance Your Cyber Security Needs

to Enhance Your Cyber Security Needs Our Service to Enhance Your Cyber Security Needs Since the business critical systems by its nature are ON all of the time and the increasingly connected world makes you open your organization to everything

More information

Solutions Technology, Inc. (STI) Corporate Capability Brief

Solutions Technology, Inc. (STI) Corporate Capability Brief Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned

More information

New Guidance on Privacy Controls for the Federal Government

New Guidance on Privacy Controls for the Federal Government New Guidance on Privacy Controls for the Federal Government IAPP Global Privacy Summit 2012 March 9, 2012 Dr. Ron Ross Computer Security Division, NIST Martha Landesberg, J.D., CIPP/US The Privacy Office,

More information

IT-CNP, Inc. Capability Statement

IT-CNP, Inc. Capability Statement Securing America s Infrastructure Security Compliant IT Operations Hosting Cyber Security Information FISMA Cloud Management Hosting Security Compliant IT Logistics Hosting 1 IT-CNP, Inc. is a Government

More information

U.S. Army Cyber Center of Excellence and Fort Gordon

U.S. Army Cyber Center of Excellence and Fort Gordon U.S. Army Cyber Center of Excellence and Fort Gordon W BUILDING A WORLD CLASS CYBER WORKFORCE TECHNET 2018 Cyberspace Capabilities in Support of Unified Land Operations- Outpacing Our Adversaries This

More information

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location: Position: Reports to: Location: Security Monitoring Engineer / (NY or NC) Director, Information Security New York, NY or Winston-Salem, NC Position Summary: The Clearing House (TCH) Information Security

More information

Defence, Safety and Security

Defence, Safety and Security Defence, Safety and Security 2 The mission of TNO TNO connects people and knowledge to create innovations that boost the sustainable competitive strength of industry and well-being of society. 3 TNO facts

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent Keeping Your SOCs Full May 26, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus on theoretical

More information

Opening Doors to Cyber and Homeland Security Careers

Opening Doors to Cyber and Homeland Security Careers Opening Doors to Cyber and Homeland Security Careers Opening Doors to Cyber and Homeland Security Careers Today s Presenters: Frederic Lemieux, Ph.D. Professor and Program Director, Cybersecurity Strategy

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

Max Security Solutions

Max Security Solutions Max Security Solutions Max Security Solutions Proactive Risk Management What we do Max Security provides comprehensive security and risk management solutions for the business sector, private clients and

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Advancing Sustainment through Public-Private Partnership

Advancing Sustainment through Public-Private Partnership Air Force Sustainment Center Advancing Sustainment through Public-Private Partnership Mr. Earl Williams AFSC/LGXB 21 August 2017 Version 1 1 Overview Public-Private Partnerships Public-Private Partnerships

More information

2017 Company Profile

2017 Company Profile 2017 Company Profile LITS Lead Technology Services 10/2/2017 INTRODUCTION Leading Innovative Technology Solutions (LITS) Lead Innovative Technology Services is an affirmative and black economic empowerment

More information

keeping executives safe

keeping executives safe keeping executives safe Neil Austin and Lawrence Dando, two career surveillance specialists, established Mint Executive in 2015, having worked on and managed some of the most complex Police operations

More information

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents

More information

DEFENSE LOGISTICS AGENCY AMERICA S COMBAT LOGISTICS SUPPORT AGENCY. Cyber Security. Safeguarding Covered Defense Information.

DEFENSE LOGISTICS AGENCY AMERICA S COMBAT LOGISTICS SUPPORT AGENCY. Cyber Security. Safeguarding Covered Defense Information. DEFENSE LOGISTICS AGENCY AMERICA S COMBAT LOGISTICS SUPPORT AGENCY Cyber Security Safeguarding Covered Defense Information 30-31 August 2016 WARFIGHTER FIRST PEOPLE & CULTURE STRATEGIC ENGAGEMENT FINANCIAL

More information

Enhancing Security With SQL Server How to balance the risks and rewards of using big data

Enhancing Security With SQL Server How to balance the risks and rewards of using big data Enhancing Security With SQL Server 2016 How to balance the risks and rewards of using big data Data s security demands and business opportunities With big data comes both great reward and risk. Every company

More information

Good morning, Chairman Harman, Ranking Member Reichert, and Members of

Good morning, Chairman Harman, Ranking Member Reichert, and Members of Statement of Michael C. Mines Deputy Assistant Director Directorate of Intelligence Federal Bureau of Investigation Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment,

More information

CYBER SOLUTIONS & THREAT INTELLIGENCE

CYBER SOLUTIONS & THREAT INTELLIGENCE CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

DEPARTMENT OF THE AIR FORCE PRESENTATION TO THE SUBCOMMITTEE ON STRATEGIC FORCES U.S. HOUSE OF REPRESENTATIVES

DEPARTMENT OF THE AIR FORCE PRESENTATION TO THE SUBCOMMITTEE ON STRATEGIC FORCES U.S. HOUSE OF REPRESENTATIVES NOT FOR PUBLICATION UNTIL RELEASED BY THE UNITED STATES HOUSE OF REPRESENTATIVES DEPARTMENT OF THE AIR FORCE PRESENTATION TO THE U.S. HOUSE OF REPRESENTATIVES SUBJECT: Assuring National Security Space:

More information

AFCEA Welcome/Opening Keynote Speech. Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey

AFCEA Welcome/Opening Keynote Speech. Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey AFCEA Welcome/Opening Keynote Speech Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey A Turkish Perspective on the Challenges of Security in a Network-Enabled Environment I would like to

More information

HOW TO DO BUSINESS WITH Lockheed Martin. Copyright 2017, Lockheed Martin Corporation. All rights reserved 0000.PPT 8/8/2017 1

HOW TO DO BUSINESS WITH Lockheed Martin. Copyright 2017, Lockheed Martin Corporation. All rights reserved 0000.PPT 8/8/2017 1 HOW TO DO BUSINESS WITH Lockheed Martin Copyright 2017, Lockheed Martin Corporation. All rights reserved 0000.PPT 8/8/2017 1 Vision Lockheed Martin is the Leading Aerospace and Global Security Company,

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior

More information

The Success of the AMRAAM DBMS/DAS

The Success of the AMRAAM DBMS/DAS The Success of the AMRAAM DBMS/DAS John Gerdine Wyle Laboratories Inc. Niceville Florida 32579 U.S.A. 1 Overview Asymmetric Threat AMRAAM Development Test and Evaluation (T&E) History Current AMRAAM Production

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

Cisco Connected Factory Accelerator Bundles

Cisco Connected Factory Accelerator Bundles Data Sheet Cisco Connected Factory Accelerator Bundles Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment

More information

BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS

BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS SAFETY AND SECURITY IN THE 21ST CENTURY National security, defence, and public safety agencies face challenges and threats that

More information

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES: (Solutions Brief) An integrated cybersecurity Administration solution for securing any Large Enterprise. The Industry s most complete protection for the Large Enterprise and Cloud Deployments. KEY SERVICES:

More information

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS Good IT governance is a key element of a well-performing enterprise. Enterprises need qualified information

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

French-American Foundation Conference on cyber issues. Opening remarks. 25 October 2017

French-American Foundation Conference on cyber issues. Opening remarks. 25 October 2017 French-American Foundation Conference on cyber issues Opening remarks 25 October 2017 Général d armée aérienne Denis MERCIER 1 Ladies and gentlemen, It is a great honour and a personal pleasure for me

More information

IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades.

IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades. Corporate Profile Company Profile IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades. As a resource partner, we offer personalized and professional

More information

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today Security Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today Staff Augmentation, Executive Staffing, Flex Staffing Achieving our main goal

More information

GREEN DEFENCE FRAMEWORK

GREEN DEFENCE FRAMEWORK GREEN DEFENCE FRAMEWORK Approved by the North Atlantic Council in February 2014 GREEN DEFENCE FRAMEWORK OVERVIEW 1. Green Defence could, at this stage, be defined as a multifaceted endeavour cutting across

More information

Written Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company

Written Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company Written Statement of Timothy J. Scott Chief Security Officer The Dow Chemical Company Representing The Dow Chemical Company and the American Chemistry Council To the United States Senate Committee on Homeland

More information

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation COL Michael R. Corpening Deputy Chief, Operations Division (CCJ6-O) 1 December 2014 The overall classification of this brief is UNCLASSIFIED

More information

The Value of ANSI Accreditation. Top 10 Advantages. of accredited third-party conformity assessment

The Value of ANSI Accreditation. Top 10 Advantages. of accredited third-party conformity assessment The Value of ANSI Accreditation Top 10 Advantages of accredited third-party conformity assessment The American National Standards Institute (ANSI) offers highly recognized accreditation programs globally

More information

Thales Cyber Assurance Webinar Your first step to Cyber Security

Thales Cyber Assurance Webinar Your first step to Cyber Security www.thalesgroup.com Thales Cyber Assurance Webinar Your first step to Cyber Security 10 February 2012 Ross Parsell/Edward Wolton 2012 Thales UK Ltd. 2 / Edward Wolton Edward has been working in what is

More information

Avionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment

Avionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment Avionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment 26 January 2017 Presented by: Mr. Chad Miller NAVAIR Cyber T&E What: Replicate Cyber Battlespace

More information

G7 Bar Associations and Councils

G7 Bar Associations and Councils COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat

More information

Intelligence & Security Overview

Intelligence & Security Overview Intelligence & Security Overview 2014 1 Our Mission Employees: ~10,000 84% cleared Headquarters: McLean, VA Mission: BAE Systems Intelligence & Security enables the U.S. government to transform data into

More information

Cybersecurity Overview

Cybersecurity Overview Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where

More information

UNCLASSIFIED. UNCLASSIFIED R-1 Line Item #49 Page 1 of 10

UNCLASSIFIED. UNCLASSIFIED R-1 Line Item #49 Page 1 of 10 Exhibit R-2, PB 2010 Office of Secretary Of Defense RDT&E Budget Item Justification DATE: May 2009 3 - Advanced Technology Development (ATD) COST ($ in Millions) FY 2008 Actual FY 2009 FY 2010 FY 2011

More information

CYBER SECURITY TRAINING

CYBER SECURITY TRAINING CYBER Security skills for the digital age. Cyber Crime has never been more predominant. The number of breaches is exponentially rising year on year leading to an ever increasing Cyber Security threat.

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Native American Risk Management Conference 20 July, 2018 Bridging the Gap: Delivering

More information

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division Critical Infrastructure Protection and Suspicious Activity Reporting Texas Department of Public Safety Intelligence & Counterterrorism Division GOAL: Prevent terrorist attacks in Texas and prevent criminal

More information

SUMMARY DEPARTMENT OF DEFENSE CYBER STRATEGY

SUMMARY DEPARTMENT OF DEFENSE CYBER STRATEGY SUMMARY DEPARTMENT OF DEFENSE CYBER STRATEGY This page left intentionally blank INTRODUCTION American prosperity, liberty, and security depend upon open and reliable access to information. The Internet

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview ND Safety Council Annual Conference

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development

Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development Noel Kyle, Program Manager Department of Homeland Security (DHS) National Cybersecurity Education

More information

AMERICAN CHAMBER OF COMMERCE IN THAILAND DIGITAL ECONOMY POSITION PAPER

AMERICAN CHAMBER OF COMMERCE IN THAILAND DIGITAL ECONOMY POSITION PAPER AMCHAM Background AMCHAM Thailand was formed in 1956 with a membership of 8 American companies and 60 American nationals. Today, AMCHAM has over 650 members, comprising 2,000 executives and professionals.

More information

Statement for the Record

Statement for the Record Statement for the Record of Seán P. McGurk Director, Control Systems Security Program National Cyber Security Division National Protection and Programs Directorate Department of Homeland Security Before

More information

Corporate Capabilities

Corporate Capabilities Corporate Capabilities 2017 Summary Thomas Edison stated, "there's a way to do it better find it." intellisolutions is 3 rd party certified as a Woman-Owned Small Business (WOSB)*. Founded in 2006 in San

More information

Recruitment Solutions for the Global Aviation Industry

Recruitment Solutions for the Global Aviation Industry Recruitment Solutions for the Global Aviation Industry Aviation Labour Group Aviation Labour Group (ALG) draws on global talent to deliver temporary and permanent recruitment solutions to International

More information