Small business showcase network security services llc
Download
1 / 38

SMALL BUSINESS SHOWCASE - PowerPoint PPT Presentation


  • 386 Views
  • Updated On :

SMALL BUSINESS SHOWCASE NETWORK SECURITY SERVICES LLC. Small Business Size: SBA Certified 8(a), HUBZone, WO, SDB Niche Areas: Computer Forensics & Managed Security IRS/Treasury Contracts: Subcontractor on IRS MITS Cyber Security, Office of the ACIO

Related searches for SMALL BUSINESS SHOWCASE

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'SMALL BUSINESS SHOWCASE' - Anita


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Small business showcase network security services llc l.jpg
SMALL BUSINESS SHOWCASENETWORK SECURITY SERVICES LLC

  • Small Business Size: SBA Certified 8(a), HUBZone, WO, SDB

  • Niche Areas: Computer Forensics & Managed Security

  • IRS/Treasury Contracts:

    • Subcontractor on IRS MITS Cyber Security, Office of the ACIO

    • Prime contractor on IRS Cyber Security Training, Electronic Crimes Unit

    • Largest award: $415,000

  • Largest Company Award:

    • Amount: Incrementally funded; currently at $415,000

    • Customer: Govt: SPAWAR Charleston. Prime: Honeywell Technology Solutions, Inc.


Who we are l.jpg
Who We Are

  • SBA Certified 8(a) and HUBZone, Woman-Owned small business

  • GSA Schedule 70 Prime Contractor

  • Seaport-E Prime Contractor

  • Provider of highest level of IT security solutions


Who we are3 l.jpg
Who We Are

  • Security Team’s Qualifications

    • Backgrounds in:

      • Law Enforcement/Military Intelligence

      • Federal Agencies

      • Prestigious Commercial Businesses

    • High levels of education & certifications


Nss founder background l.jpg
NSS Founder Background

  • Law Enforcement Officer (19 years experience)

  • Detective

    • Computer Crime Investigations

  • Commercial Field

    • DCITP, Lead Instructor for Network Investigations & Intrusions

    • Ernst & Young, Director of Incident Response, National Forensics Lab

    • Fiderus Inc., Director of Incident Response & Penetration Testing


Core competencies l.jpg
Core Competencies

  • Information Assurance Services

  • Managed Enterprise Security Services

  • Computer Forensics

  • Network Investigations

  • Computer Forensics Training


What we offer l.jpg
What We Offer

  • Information Assurance Services

    • Certification and Accreditation

    • Risk & Vulnerability Assessments

    • Disaster Recovery and Policy Development

  • Managed Security Services

    • Firewalls/Routers

    • IDS/IPS

    • Incident Response

  • Computer Forensic Investigative Services

  • Computer Crime Investigative Training



Information assurance services l.jpg
Information Assurance Services

  • Information Assurance (IA)

    • Certification & Accreditation

    • Vulnerability Assessments

    • Penetration Testing

    • Application Testing


Slide9 l.jpg
C&A

  • The Federal Information Security Management Act (FISMA)

  • Compliance with FISMA requires expert security analysis and evaluation skills and a thorough understanding of the FISMA requirements


Slide10 l.jpg
C&A

  • NSS Security Experts assist and guide in the compliance of efforts for the following standards:

    • FISMA

    • NIST 800 series

    • FIPS 199,200

    • DITSCAP/DIACAP

    • NIACAP

    • HIPAA

  • ST&E Testing of the above standards


Slide11 l.jpg
C&A

  • Life Cycle Certification Support

    • Definition

    • Verification

    • Validation

    • Post-Accreditation

  • Certification Audit Support


Vulnerability scanning l.jpg
Vulnerability Scanning

Checks for known vulnerabilities

Work closely with customer to identify scope and depth of scanning

Generally, systems are checked for known exploits and vulnerabilities

Work with customer to mitigate and mediate identified risks

Assist in solution development and implementation


Penetration testing l.jpg
Penetration Testing

In depth probing and testing

Exploit unknown or unpublished vulnerabilities

Requires more time and higher skilled people


Application testing l.jpg
Application Testing

Achilles heel of service-oriented architecture

Applications are key to leveraging benefits of information systems

Create the greatest risk

Extensive code

Chance of insecure or exploitable code being created



Managed enterprise security services16 l.jpg
Managed Enterprise Security Services

Firewalls

Routers

Intrusion Detection Systems

Intrusion Prevention Systems

Incident Response


Firewalls and routers l.jpg
Firewalls and Routers

  • Monitoring & Compliance

    • Log analysis

    • Configuration review and assessment

  • Configuration updates and adjustments

  • Rule testing and evaluation


Intrusion detection systems intrusion prevention systems l.jpg
Intrusion Detection Systems & Intrusion Prevention Systems

  • Manage and monitor IPS/IDS

    • Monitor network traffic for:

    • Hostile network activity

    • Ex-fill of sensitive information

    • Policy enforcement and violation

      • PII disclosure

      • Plain Text

    • Respond to alerts (IR)



Computer forensic services l.jpg
Computer Forensic Services

Mobile Forensics

Network Forensics

Intrusion Investigations

Incident Response


Network forensics l.jpg
Network Forensics

Wiretaps

Packet analysis

Server data acquisition

Live data collection

Data validation

21


Computer crime investigative training l.jpg
Computer CrimeInvestigative Training


Multiple training courses l.jpg
Multiple Training Courses

Computer Forensics

Linux Forensics

Mobile Forensics

Network Forensics

Intrusion Investigations

Internet Investigations

Wire Taps


Training clients l.jpg
Training Clients

DCITP- Defense Computer Investigations Training Program for DoD

Department of State

George Washington University

Internal Revenue Service

Regional Computer Forensics Group

Federal Bureau of Investigations

SOCOM

24



Slide26 l.jpg
IRS

  • SPAWAR Systems Center Charleston

    • Performing ST&E

    • Testing:

      • FISMA Standards

      • NIST 800-53, 800-53A

      • FIPS 199, 200 

      • Technology: Cisco, Unix, Microsoft, MSSQL 2000, MSSQL 2005, and Oracle 10.1(g)


Department of navy l.jpg
Department of Navy

  • SPAWAR - Navy Medicine Enterprise Security Operations Center

    • Router and Firewall security

    • Management and monitoring support

    • Policy compliance with SOP

    • Develop and document operating policies and procedures


Work experience l.jpg
Work Experience

  • IRS

  • USDA

  • Department of Navy

  • HQ, FIRST U.S. ARMY

  • SAIC

  • Commercial Banks

  • Unions


Work experience29 l.jpg
Work Experience

  • FBI

  • OIG Philadelphia

  • Philadelphia PD IA

  • Large Prime Contractors

  • Law Firms & Private Investigative Firms

  • Commercial Banks

  • Commercial Businesses

29



Certifications education l.jpg

CFCE

CCE

EnCE

GIAC (SANS)

MCSE

CISSP

CCNA

CCSP

Security+

CCNP + Security

MA Sociology/Criminology

MS Information Systems

Certifications & Education


Expert testimony l.jpg
Expert Testimony

  • Certified Expert Computer Forensics

  • Certified Expert Mobile Forensics

  • Certified Witness Edged Weapons

32


Customer satisfaction l.jpg
Customer Satisfaction

  • We have had outstanding performance reviews from our customers

  • We place appropriately skilled, technically proficient security engineers

  • We have several teaming opportunities on large, upcoming projects



Upcoming projects l.jpg
Upcoming Projects

  • Support C&A efforts for Marine Corps

  • Increase support on Navy Medicine Enterprise Security Operations Center

  • Intrusion Prevention/Detection

  • Incident Response

  • Manage Computer Forensics Lab

  • Provide computer forensic and incident response support to government SOC/NOC


Goals l.jpg
Goals

  • Achieve prime contractor status

    • Start small and grow

  • Stay up-to-date on certifications and education

  • Continue to provide our customers with

    Quality of Service and Customer Satisfaction


Why choose nss l.jpg
Why Choose NSS

  • Network Security is in our name & is what we do

  • Skilled and Certified Security Engineers

  • Strong Past Performance & Notable Responsiveness


Our contact information l.jpg
Our Contact Information

VA office: 2106 Harbor Drive, Greenbackville, VA 23356

SC office:1156 Bowman Rd, #200, Mt. Pleasant, SC 29464

Phone: 703-319-0411 or 843-416-1196

Fax: 866-670-1961

President: (Ms) Alexei Haughom

Email: [email protected]

Website: www.network-securityservices.com


ad