Cyber Security Solutions 2 Assessment Analysis & Planning
Design & Architecture Development & Implementation O&M
Critical Infrastructure Security Systems Cybersecurity for Critical
Infrastructure Cybersecurity for Networks The Security Life Cycles
Solutions/Services Families
Slide 3
Cyber CIP Offerings Summary Full life cycle offerings
Consulting Assessments, analysis Threat, vulnerability assessment,
which includes a range of activities from network mapping through
penetration testing (both physical and cyber) Security assessment
(policy, process, procedure, technology, controls, etc.) Security
risk analysis and management Certification and accreditation
against relevant standards, regulations, industry best practices
Incident response forensic investigation, remediation activities,
recovery and continuity Cyber solutions development and
implementation Network engineering and architecture, security
architecture, design and implementation tailored to individual
customer needs, requirements and budgets Develop solutions and test
in realistic simulation of customer environment against real world
threats Cyber defense operations Implementation of solution in
customer enterprise Provide trained, accredited staff for cyber
defense operations in customer enterprise all aspects of defense
operation available including real time and continuous monitoring,
incident identification and analysis, response and continuity
planning and operation 3
Slide 4
ICS Overlay & RMF Implementation The Risk Management
Framework
Slide 5
Converged Security Enterprise 5 Facilities &
EnvironmentalSituational Awareness Physical Security Integrated
Command and Control Crisis Management Systems Monitoring Event
Correlation Risk Management Incident Monitoring Threat /
Vulnerability Analysis ICAM Solutions PSIM Solutions Policy and
Strategy Planning Cost / Benefit Analysis Intelligence Public
Safety Continuity of Operations Emergency Planning Integrated
Electronic Security Systems Access Control Perimeter Intrusion
Detection Asset Management Alerting / Notification Systems Video
Surveillance Audio Surveillance Vehicle Tracking Emergency Response
Resources NOC, SOC, NOSC, CERT Operations Access and Authorization
Firewalls and IDS HBSS Network Monitoring Vulnerability / IAVA
Incident Handling Forensic Investigation Response capability Fire,
Life, Safety Systems Building Control Systems HVAC Lighting Sensor
Systems CBRNE Systems Power Metering Systems SCADA Systems ICS
Systems Manufacturing / Production Process Control Systems Cyber
Security Critical Control Systems Converged Security
Slide 6
Key Capabilities Identity, Credentialing, Access Management
(ICAM) Systems Integrated Electronic Security Systems Integrated
Enterprise Physical Security Systems Full Lifecycle HSPD-12
Certified Integrator Integrated Security Operations Control (PSIM)
Threat / Vulnerability Assessments & Mitigation Cloud Computing
Large High Performance Network Implementation and Operations Data
Center Modernization Migration & Enterprise Virtualization NOC
/ SOC Operations & Management End-to-End Cyber Defense
Operations Computer Emergency Response Team Operations
Certification & Accreditation of Cyber Systems Cyber Policy
Development and Implementation Cyber Threat Identification,
Analysis and Mitigation Network Design, Engineering &
Development Network Research & Development Key Functional
Skills Company Proprietary 6
Slide 7
Industrial Control Systems Security 7 Protecting
Mission-Critical Facilities Protecting ICS and SCADA Protecting IT
Infrastructure - Cyber Enclave
Slide 8
Parsons Cyber Solutions Center 8
Slide 9
The Cyber Solutions Center 9 Emulate customer systems - model
networks, ICS, SCADA systems Simulate operation Identify
vulnerabilities Introduce attacks and malevolent events Demonstrate
consequences Introduce security solutions/optimize/demonstrate Test
solutions, configuration changes, hardware and software and
provides understanding prior to installing on operational system
Enables solutions development for specific needs. Provides
certification/accreditation testing without placing operational
systems at risk Environment to create and mature cyber security
initiatives, technology, processes and solutions Demonstration not
Estimation
Slide 10
So what? Why should you care? Principal need: deliver service,
stay in business, satisfy consumer/citizen Security enables service
delivery in spite of the threat environment Not a nice to have but
assurance that threats intentional or accidental will not
marginalize, constrain, or damage your business Customers/citizens
have an expectation of service and a secure environment 10
Slide 11
Thank You 11 Phil Lacombe 703-678-3597
[email protected]@securemissionsolutions.com
Mark McIntosh 571-221-2881
[email protected]@parsons.com