Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture...

download Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.

If you can't read please download the document

Transcript of Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture...

  • Slide 1
  • Security Offering
  • Slide 2
  • Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure Security Systems Cybersecurity for Critical Infrastructure Cybersecurity for Networks The Security Life Cycles Solutions/Services Families
  • Slide 3
  • Cyber CIP Offerings Summary Full life cycle offerings Consulting Assessments, analysis Threat, vulnerability assessment, which includes a range of activities from network mapping through penetration testing (both physical and cyber) Security assessment (policy, process, procedure, technology, controls, etc.) Security risk analysis and management Certification and accreditation against relevant standards, regulations, industry best practices Incident response forensic investigation, remediation activities, recovery and continuity Cyber solutions development and implementation Network engineering and architecture, security architecture, design and implementation tailored to individual customer needs, requirements and budgets Develop solutions and test in realistic simulation of customer environment against real world threats Cyber defense operations Implementation of solution in customer enterprise Provide trained, accredited staff for cyber defense operations in customer enterprise all aspects of defense operation available including real time and continuous monitoring, incident identification and analysis, response and continuity planning and operation 3
  • Slide 4
  • ICS Overlay & RMF Implementation The Risk Management Framework
  • Slide 5
  • Converged Security Enterprise 5 Facilities & EnvironmentalSituational Awareness Physical Security Integrated Command and Control Crisis Management Systems Monitoring Event Correlation Risk Management Incident Monitoring Threat / Vulnerability Analysis ICAM Solutions PSIM Solutions Policy and Strategy Planning Cost / Benefit Analysis Intelligence Public Safety Continuity of Operations Emergency Planning Integrated Electronic Security Systems Access Control Perimeter Intrusion Detection Asset Management Alerting / Notification Systems Video Surveillance Audio Surveillance Vehicle Tracking Emergency Response Resources NOC, SOC, NOSC, CERT Operations Access and Authorization Firewalls and IDS HBSS Network Monitoring Vulnerability / IAVA Incident Handling Forensic Investigation Response capability Fire, Life, Safety Systems Building Control Systems HVAC Lighting Sensor Systems CBRNE Systems Power Metering Systems SCADA Systems ICS Systems Manufacturing / Production Process Control Systems Cyber Security Critical Control Systems Converged Security
  • Slide 6
  • Key Capabilities Identity, Credentialing, Access Management (ICAM) Systems Integrated Electronic Security Systems Integrated Enterprise Physical Security Systems Full Lifecycle HSPD-12 Certified Integrator Integrated Security Operations Control (PSIM) Threat / Vulnerability Assessments & Mitigation Cloud Computing Large High Performance Network Implementation and Operations Data Center Modernization Migration & Enterprise Virtualization NOC / SOC Operations & Management End-to-End Cyber Defense Operations Computer Emergency Response Team Operations Certification & Accreditation of Cyber Systems Cyber Policy Development and Implementation Cyber Threat Identification, Analysis and Mitigation Network Design, Engineering & Development Network Research & Development Key Functional Skills Company Proprietary 6
  • Slide 7
  • Industrial Control Systems Security 7 Protecting Mission-Critical Facilities Protecting ICS and SCADA Protecting IT Infrastructure - Cyber Enclave
  • Slide 8
  • Parsons Cyber Solutions Center 8
  • Slide 9
  • The Cyber Solutions Center 9 Emulate customer systems - model networks, ICS, SCADA systems Simulate operation Identify vulnerabilities Introduce attacks and malevolent events Demonstrate consequences Introduce security solutions/optimize/demonstrate Test solutions, configuration changes, hardware and software and provides understanding prior to installing on operational system Enables solutions development for specific needs. Provides certification/accreditation testing without placing operational systems at risk Environment to create and mature cyber security initiatives, technology, processes and solutions Demonstration not Estimation
  • Slide 10
  • So what? Why should you care? Principal need: deliver service, stay in business, satisfy consumer/citizen Security enables service delivery in spite of the threat environment Not a nice to have but assurance that threats intentional or accidental will not marginalize, constrain, or damage your business Customers/citizens have an expectation of service and a secure environment 10
  • Slide 11
  • Thank You 11 Phil Lacombe 703-678-3597 [email protected]@securemissionsolutions.com Mark McIntosh 571-221-2881 [email protected]@parsons.com