- Cyber Operations
CDM -Continuous Diagnostics and Mitigation
Federated IT Subject Matter Experts (SMEs) will work with your federal program manages and technical teams to coordinate with the Department of Homeland Security (DHS) to fortifying the cybersecurity posture of your agency networks and systems. The DHS sponsored CDM Program provides your agency with capabilities and tools and identify cybersecurity risks on an ongoing basis, prioritize these risks based on potential impacts, and enable cybersecurity personnel to mitigate the most significant problems first. The program is designed to provide adequate, risk-based, and cost-effective cybersecurity and more efficiently allocate cybersecurity resources. We help you tackle the four phases of CDM:
• PHASE 1 – What is on the network?
• PHASE 2 – Who is on the network?
• PHASE 3 – What is happening on the network?
• PHASE 4 – How is data protected?
CNA – Computer Network Attack
Federated IT will assist your organization to identify and develop cyber targets based upon open source analytics and reports. We will design program-specific Tactics, Techniques and Procedures to execute tactical offensive capabilities.
CND – Computer Network Defense
Federated IT will assist your organization to establish preemptive measures protecting your most vital Information Technology and data assets. We employ proactive measures through network hardening and network monitoring to ensure that all aspects of your environment are protected.
CNE – Computer Network Exploitation
We provide Cyber Analysts to support intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversarial automated information systems, networks and network-connected devices.
Our staff of cleared professionals deliver computer forensic investigative services and Security Operations Center (SOC) services to support exploitation of information gleaned from a multitude of IT assets, devices and networks. Our capabilities encompass Computer Forensic Investigation, Digital Evidence Analysis, Forensic Data Capture and Expert Witness Testimony. A wide range of analytic and forensic data aggregation tools are employed, included in the aforementioned CDM Program.
- Incident Response
Federated IT provides Incident Response capabilities 24/7/365 to support you in your time of crisis! When an incident occurs we will respond quickly and efficiently and will work with your team to assess the situation, establish a mitigation and recovery plan and collect the information pointing to the root cause of the incident. The most complex aspect of this offering is the evidence collection and handling. Federated IT Consultants understand proper evidence handling and chain of custody rules.
- Information Assurance
Federated IT provides information systems security lifecycle management, vulnerability assessment and evaluation, and certification and accreditation service for DIACAP. Specifically addressing regulatory/governmental compliance and business continuity we ensure that your mission critical assets are always ready and secure.
ISR – Intelligence, Surveillance and Reconnaissance
Federated IT provides analysts to support Cyber Network ISR Operations and activities. We leverage multi-domain ISR experts with tools and techniques that provide an aggressive approach to collecting and producing analysis and dissemination of ISR data in support of Department of Defense, Civilian and Commercial clients.
- Cyber Security
Federated IT provides full spectrum Cyber Security Services designed to ensure your organization is postured to protect its Information Technology assets and Networks. Our Consultants are trained experts in driving governmental and corporate security compliance and vulnerability management. We will assist you in developing your Cyber Security framework, secure your environment, manage risk and develop your policies. Our services include:
Federated IT’s Certified Security Consultants provide expertise in compliance assessment in the vast array of Information Technology regulatory matters. Whether it’s DIACAP, FISMA, HIPAA or NIST, we can reduce the complexity and simplify the processes for you.
When implementing and deploying new capabilities and technologies into your enterprise, it inevitably breeds risk. Federated IT Security Consultants work with you to proactively address potential vulnerabilities and implement a plan on how to address these issues shielding your organization from creating new areas that could be exploited by potential attackers and adversaries.
IT Maturity Modeling
Federated IT will provides Security Consulting expertise to assist your organization in base lining and structuring your operation to face the current and emerging Cyber threat. Understanding your capabilities from both a workforce and tools perspective is critical when deciding what investments to make in regard to cyber security human capital initiatives. Our consultants will work with your team to assess your current posture and create a plan to level the organization to meet current and future needs.
Federated IT provides Security Consulting expertise to guide you through the process of implementing a comprehensive cyber security policy. We will help you define the best policies and architectures (aligned with current regulatory guidance) to address your unique requirements.
"“It is with great pleasure that I highlight the outstanding work that Federated has done in support of our group during the last year. Since Federated joined our team they have consistently excelled in their duties and made vital contributions to our critical mission.”"