1 / 38

SMALL BUSINESS SHOWCASE NETWORK SECURITY SERVICES LLC

SMALL BUSINESS SHOWCASE NETWORK SECURITY SERVICES LLC. Small Business Size: SBA Certified 8(a), HUBZone, WO, SDB Niche Areas: Computer Forensics & Managed Security IRS/Treasury Contracts: Subcontractor on IRS MITS Cyber Security, Office of the ACIO

niveditha
Télécharger la présentation

SMALL BUSINESS SHOWCASE NETWORK SECURITY SERVICES LLC

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SMALL BUSINESS SHOWCASENETWORK SECURITY SERVICES LLC • Small Business Size: SBA Certified 8(a), HUBZone, WO, SDB • Niche Areas: Computer Forensics & Managed Security • IRS/Treasury Contracts: • Subcontractor on IRS MITS Cyber Security, Office of the ACIO • Prime contractor on IRS Cyber Security Training, Electronic Crimes Unit • Largest award: $415,000 • Largest Company Award: • Amount: Incrementally funded; currently at $415,000 • Customer: Govt: SPAWAR Charleston. Prime: Honeywell Technology Solutions, Inc.

  2. Who We Are • SBA Certified 8(a) and HUBZone, Woman-Owned small business • GSA Schedule 70 Prime Contractor • Seaport-E Prime Contractor • Provider of highest level of IT security solutions

  3. Who We Are • Security Team’s Qualifications • Backgrounds in: • Law Enforcement/Military Intelligence • Federal Agencies • Prestigious Commercial Businesses • High levels of education & certifications

  4. NSS Founder Background • Law Enforcement Officer (19 years experience) • Detective • Computer Crime Investigations • Commercial Field • DCITP, Lead Instructor for Network Investigations & Intrusions • Ernst & Young, Director of Incident Response, National Forensics Lab • Fiderus Inc., Director of Incident Response & Penetration Testing

  5. Core Competencies • Information Assurance Services • Managed Enterprise Security Services • Computer Forensics • Network Investigations • Computer Forensics Training

  6. What We Offer • Information Assurance Services • Certification and Accreditation • Risk & Vulnerability Assessments • Disaster Recovery and Policy Development • Managed Security Services • Firewalls/Routers • IDS/IPS • Incident Response • Computer Forensic Investigative Services • Computer Crime Investigative Training

  7. Information Assurance

  8. Information Assurance Services • Information Assurance (IA) • Certification & Accreditation • Vulnerability Assessments • Penetration Testing • Application Testing

  9. C&A • The Federal Information Security Management Act (FISMA) • Compliance with FISMA requires expert security analysis and evaluation skills and a thorough understanding of the FISMA requirements

  10. C&A • NSS Security Experts assist and guide in the compliance of efforts for the following standards: • FISMA • NIST 800 series • FIPS 199,200 • DITSCAP/DIACAP • NIACAP • HIPAA • ST&E Testing of the above standards

  11. C&A • Life Cycle Certification Support • Definition • Verification • Validation • Post-Accreditation • Certification Audit Support

  12. Vulnerability Scanning Checks for known vulnerabilities Work closely with customer to identify scope and depth of scanning Generally, systems are checked for known exploits and vulnerabilities Work with customer to mitigate and mediate identified risks Assist in solution development and implementation

  13. Penetration Testing In depth probing and testing Exploit unknown or unpublished vulnerabilities Requires more time and higher skilled people

  14. Application Testing Achilles heel of service-oriented architecture Applications are key to leveraging benefits of information systems Create the greatest risk Extensive code Chance of insecure or exploitable code being created

  15. Managed Enterprise Security Services

  16. Managed Enterprise Security Services Firewalls Routers Intrusion Detection Systems Intrusion Prevention Systems Incident Response

  17. Firewalls and Routers • Monitoring & Compliance • Log analysis • Configuration review and assessment • Configuration updates and adjustments • Rule testing and evaluation

  18. Intrusion Detection Systems & Intrusion Prevention Systems • Manage and monitor IPS/IDS • Monitor network traffic for: • Hostile network activity • Ex-fill of sensitive information • Policy enforcement and violation • PII disclosure • Plain Text • Respond to alerts (IR)

  19. Computer Forensics

  20. Computer Forensic Services Mobile Forensics Network Forensics Intrusion Investigations Incident Response

  21. Network Forensics Wiretaps Packet analysis Server data acquisition Live data collection Data validation 21

  22. Computer CrimeInvestigative Training

  23. Multiple Training Courses Computer Forensics Linux Forensics Mobile Forensics Network Forensics Intrusion Investigations Internet Investigations Wire Taps

  24. Training Clients DCITP- Defense Computer Investigations Training Program for DoD Department of State George Washington University Internal Revenue Service Regional Computer Forensics Group Federal Bureau of Investigations SOCOM 24

  25. Current Projects

  26. IRS • SPAWAR Systems Center Charleston • Performing ST&E • Testing: • FISMA Standards • NIST 800-53, 800-53A • FIPS 199, 200  • Technology: Cisco, Unix, Microsoft, MSSQL 2000, MSSQL 2005, and Oracle 10.1(g)

  27. Department of Navy • SPAWAR - Navy Medicine Enterprise Security Operations Center • Router and Firewall security • Management and monitoring support • Policy compliance with SOP • Develop and document operating policies and procedures

  28. Work Experience • IRS • USDA • Department of Navy • HQ, FIRST U.S. ARMY • SAIC • Commercial Banks • Unions

  29. Work Experience • FBI • OIG Philadelphia • Philadelphia PD IA • Large Prime Contractors • Law Firms & Private Investigative Firms • Commercial Banks • Commercial Businesses 29

  30. The NSS Security Team

  31. CFCE CCE EnCE GIAC (SANS) MCSE CISSP CCNA CCSP Security+ CCNP + Security MA Sociology/Criminology MS Information Systems Certifications & Education

  32. Expert Testimony • Certified Expert Computer Forensics • Certified Expert Mobile Forensics • Certified Witness Edged Weapons 32

  33. Customer Satisfaction • We have had outstanding performance reviews from our customers • We place appropriately skilled, technically proficient security engineers • We have several teaming opportunities on large, upcoming projects

  34. Future of NSS

  35. Upcoming Projects • Support C&A efforts for Marine Corps • Increase support on Navy Medicine Enterprise Security Operations Center • Intrusion Prevention/Detection • Incident Response • Manage Computer Forensics Lab • Provide computer forensic and incident response support to government SOC/NOC

  36. Goals • Achieve prime contractor status • Start small and grow • Stay up-to-date on certifications and education • Continue to provide our customers with Quality of Service and Customer Satisfaction

  37. Why Choose NSS • Network Security is in our name & is what we do • Skilled and Certified Security Engineers • Strong Past Performance & Notable Responsiveness

  38. Our Contact Information VA office: 2106 Harbor Drive, Greenbackville, VA 23356 SC office:1156 Bowman Rd, #200, Mt. Pleasant, SC 29464 Phone: 703-319-0411 or 843-416-1196 Fax: 866-670-1961 President: (Ms) Alexei Haughom Email: alex@netsec.cc Website: www.network-securityservices.com

More Related