Small business showcase network security services llc l.jpg
This presentation is the property of its rightful owner.
Sponsored Links
1 / 38

SMALL BUSINESS SHOWCASE NETWORK SECURITY SERVICES LLC PowerPoint PPT Presentation


SMALL BUSINESS SHOWCASE NETWORK SECURITY SERVICES LLC. Small Business Size: SBA Certified 8(a), HUBZone, WO, SDB Niche Areas: Computer Forensics & Managed Security IRS/Treasury Contracts: Subcontractor on IRS MITS Cyber Security, Office of the ACIO

Related searches for SMALL BUSINESS SHOWCASE NETWORK SECURITY SERVICES LLC

Download Presentation

SMALL BUSINESS SHOWCASE NETWORK SECURITY SERVICES LLC

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Small business showcase network security services llc l.jpg

SMALL BUSINESS SHOWCASENETWORK SECURITY SERVICES LLC

  • Small Business Size: SBA Certified 8(a), HUBZone, WO, SDB

  • Niche Areas: Computer Forensics & Managed Security

  • IRS/Treasury Contracts:

    • Subcontractor on IRS MITS Cyber Security, Office of the ACIO

    • Prime contractor on IRS Cyber Security Training, Electronic Crimes Unit

    • Largest award: $415,000

  • Largest Company Award:

    • Amount: Incrementally funded; currently at $415,000

    • Customer: Govt: SPAWAR Charleston. Prime: Honeywell Technology Solutions, Inc.


Who we are l.jpg

Who We Are

  • SBA Certified 8(a) and HUBZone, Woman-Owned small business

  • GSA Schedule 70 Prime Contractor

  • Seaport-E Prime Contractor

  • Provider of highest level of IT security solutions


Who we are3 l.jpg

Who We Are

  • Security Team’s Qualifications

    • Backgrounds in:

      • Law Enforcement/Military Intelligence

      • Federal Agencies

      • Prestigious Commercial Businesses

    • High levels of education & certifications


Nss founder background l.jpg

NSS Founder Background

  • Law Enforcement Officer (19 years experience)

  • Detective

    • Computer Crime Investigations

  • Commercial Field

    • DCITP, Lead Instructor for Network Investigations & Intrusions

    • Ernst & Young, Director of Incident Response, National Forensics Lab

    • Fiderus Inc., Director of Incident Response & Penetration Testing


Core competencies l.jpg

Core Competencies

  • Information Assurance Services

  • Managed Enterprise Security Services

  • Computer Forensics

  • Network Investigations

  • Computer Forensics Training


What we offer l.jpg

What We Offer

  • Information Assurance Services

    • Certification and Accreditation

    • Risk & Vulnerability Assessments

    • Disaster Recovery and Policy Development

  • Managed Security Services

    • Firewalls/Routers

    • IDS/IPS

    • Incident Response

  • Computer Forensic Investigative Services

  • Computer Crime Investigative Training


Information assurance l.jpg

Information Assurance


Information assurance services l.jpg

Information Assurance Services

  • Information Assurance (IA)

    • Certification & Accreditation

    • Vulnerability Assessments

    • Penetration Testing

    • Application Testing


Slide9 l.jpg

C&A

  • The Federal Information Security Management Act (FISMA)

  • Compliance with FISMA requires expert security analysis and evaluation skills and a thorough understanding of the FISMA requirements


Slide10 l.jpg

C&A

  • NSS Security Experts assist and guide in the compliance of efforts for the following standards:

    • FISMA

    • NIST 800 series

    • FIPS 199,200

    • DITSCAP/DIACAP

    • NIACAP

    • HIPAA

  • ST&E Testing of the above standards


Slide11 l.jpg

C&A

  • Life Cycle Certification Support

    • Definition

    • Verification

    • Validation

    • Post-Accreditation

  • Certification Audit Support


Vulnerability scanning l.jpg

Vulnerability Scanning

Checks for known vulnerabilities

Work closely with customer to identify scope and depth of scanning

Generally, systems are checked for known exploits and vulnerabilities

Work with customer to mitigate and mediate identified risks

Assist in solution development and implementation


Penetration testing l.jpg

Penetration Testing

In depth probing and testing

Exploit unknown or unpublished vulnerabilities

Requires more time and higher skilled people


Application testing l.jpg

Application Testing

Achilles heel of service-oriented architecture

Applications are key to leveraging benefits of information systems

Create the greatest risk

Extensive code

Chance of insecure or exploitable code being created


Managed enterprise security services l.jpg

Managed Enterprise Security Services


Managed enterprise security services16 l.jpg

Managed Enterprise Security Services

Firewalls

Routers

Intrusion Detection Systems

Intrusion Prevention Systems

Incident Response


Firewalls and routers l.jpg

Firewalls and Routers

  • Monitoring & Compliance

    • Log analysis

    • Configuration review and assessment

  • Configuration updates and adjustments

  • Rule testing and evaluation


Intrusion detection systems intrusion prevention systems l.jpg

Intrusion Detection Systems & Intrusion Prevention Systems

  • Manage and monitor IPS/IDS

    • Monitor network traffic for:

    • Hostile network activity

    • Ex-fill of sensitive information

    • Policy enforcement and violation

      • PII disclosure

      • Plain Text

    • Respond to alerts (IR)


Computer forensics l.jpg

Computer Forensics


Computer forensic services l.jpg

Computer Forensic Services

Mobile Forensics

Network Forensics

Intrusion Investigations

Incident Response


Network forensics l.jpg

Network Forensics

Wiretaps

Packet analysis

Server data acquisition

Live data collection

Data validation

21


Computer crime investigative training l.jpg

Computer CrimeInvestigative Training


Multiple training courses l.jpg

Multiple Training Courses

Computer Forensics

Linux Forensics

Mobile Forensics

Network Forensics

Intrusion Investigations

Internet Investigations

Wire Taps


Training clients l.jpg

Training Clients

DCITP- Defense Computer Investigations Training Program for DoD

Department of State

George Washington University

Internal Revenue Service

Regional Computer Forensics Group

Federal Bureau of Investigations

SOCOM

24


Current projects l.jpg

Current Projects


Slide26 l.jpg

IRS

  • SPAWAR Systems Center Charleston

    • Performing ST&E

    • Testing:

      • FISMA Standards

      • NIST 800-53, 800-53A

      • FIPS 199, 200 

      • Technology: Cisco, Unix, Microsoft, MSSQL 2000, MSSQL 2005, and Oracle 10.1(g)


Department of navy l.jpg

Department of Navy

  • SPAWAR - Navy Medicine Enterprise Security Operations Center

    • Router and Firewall security

    • Management and monitoring support

    • Policy compliance with SOP

    • Develop and document operating policies and procedures


Work experience l.jpg

Work Experience

  • IRS

  • USDA

  • Department of Navy

  • HQ, FIRST U.S. ARMY

  • SAIC

  • Commercial Banks

  • Unions


Work experience29 l.jpg

Work Experience

  • FBI

  • OIG Philadelphia

  • Philadelphia PD IA

  • Large Prime Contractors

  • Law Firms & Private Investigative Firms

  • Commercial Banks

  • Commercial Businesses

29


The nss security team l.jpg

The NSS Security Team


Certifications education l.jpg

CFCE

CCE

EnCE

GIAC (SANS)

MCSE

CISSP

CCNA

CCSP

Security+

CCNP + Security

MA Sociology/Criminology

MS Information Systems

Certifications & Education


Expert testimony l.jpg

Expert Testimony

  • Certified Expert Computer Forensics

  • Certified Expert Mobile Forensics

  • Certified Witness Edged Weapons

32


Customer satisfaction l.jpg

Customer Satisfaction

  • We have had outstanding performance reviews from our customers

  • We place appropriately skilled, technically proficient security engineers

  • We have several teaming opportunities on large, upcoming projects


Future of nss l.jpg

Future of NSS


Upcoming projects l.jpg

Upcoming Projects

  • Support C&A efforts for Marine Corps

  • Increase support on Navy Medicine Enterprise Security Operations Center

  • Intrusion Prevention/Detection

  • Incident Response

  • Manage Computer Forensics Lab

  • Provide computer forensic and incident response support to government SOC/NOC


Goals l.jpg

Goals

  • Achieve prime contractor status

    • Start small and grow

  • Stay up-to-date on certifications and education

  • Continue to provide our customers with

    Quality of Service and Customer Satisfaction


Why choose nss l.jpg

Why Choose NSS

  • Network Security is in our name & is what we do

  • Skilled and Certified Security Engineers

  • Strong Past Performance & Notable Responsiveness


Our contact information l.jpg

Our Contact Information

VA office: 2106 Harbor Drive, Greenbackville, VA 23356

SC office:1156 Bowman Rd, #200, Mt. Pleasant, SC 29464

Phone: 703-319-0411 or 843-416-1196

Fax: 866-670-1961

President: (Ms) Alexei Haughom

Email: [email protected]

Website: www.network-securityservices.com


  • Login