small business showcase network security services llc
Download
Skip this Video
Download Presentation
SMALL BUSINESS SHOWCASE NETWORK SECURITY SERVICES LLC

Loading in 2 Seconds...

play fullscreen
1 / 38

SMALL BUSINESS SHOWCASE - PowerPoint PPT Presentation


  • 387 Views
  • Uploaded on

SMALL BUSINESS SHOWCASE NETWORK SECURITY SERVICES LLC. Small Business Size: SBA Certified 8(a), HUBZone, WO, SDB Niche Areas: Computer Forensics & Managed Security IRS/Treasury Contracts: Subcontractor on IRS MITS Cyber Security, Office of the ACIO

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'SMALL BUSINESS SHOWCASE' - Anita


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
small business showcase network security services llc
SMALL BUSINESS SHOWCASENETWORK SECURITY SERVICES LLC
  • Small Business Size: SBA Certified 8(a), HUBZone, WO, SDB
  • Niche Areas: Computer Forensics & Managed Security
  • IRS/Treasury Contracts:
    • Subcontractor on IRS MITS Cyber Security, Office of the ACIO
    • Prime contractor on IRS Cyber Security Training, Electronic Crimes Unit
    • Largest award: $415,000
  • Largest Company Award:
    • Amount: Incrementally funded; currently at $415,000
    • Customer: Govt: SPAWAR Charleston. Prime: Honeywell Technology Solutions, Inc.
who we are
Who We Are
  • SBA Certified 8(a) and HUBZone, Woman-Owned small business
  • GSA Schedule 70 Prime Contractor
  • Seaport-E Prime Contractor
  • Provider of highest level of IT security solutions
who we are3
Who We Are
  • Security Team’s Qualifications
    • Backgrounds in:
      • Law Enforcement/Military Intelligence
      • Federal Agencies
      • Prestigious Commercial Businesses
    • High levels of education & certifications
nss founder background
NSS Founder Background
  • Law Enforcement Officer (19 years experience)
  • Detective
    • Computer Crime Investigations
  • Commercial Field
    • DCITP, Lead Instructor for Network Investigations & Intrusions
    • Ernst & Young, Director of Incident Response, National Forensics Lab
    • Fiderus Inc., Director of Incident Response & Penetration Testing
core competencies
Core Competencies
  • Information Assurance Services
  • Managed Enterprise Security Services
  • Computer Forensics
  • Network Investigations
  • Computer Forensics Training
what we offer
What We Offer
  • Information Assurance Services
    • Certification and Accreditation
    • Risk & Vulnerability Assessments
    • Disaster Recovery and Policy Development
  • Managed Security Services
    • Firewalls/Routers
    • IDS/IPS
    • Incident Response
  • Computer Forensic Investigative Services
  • Computer Crime Investigative Training
information assurance services
Information Assurance Services
  • Information Assurance (IA)
    • Certification & Accreditation
    • Vulnerability Assessments
    • Penetration Testing
    • Application Testing
slide9
C&A
  • The Federal Information Security Management Act (FISMA)
  • Compliance with FISMA requires expert security analysis and evaluation skills and a thorough understanding of the FISMA requirements
slide10
C&A
  • NSS Security Experts assist and guide in the compliance of efforts for the following standards:
    • FISMA
    • NIST 800 series
    • FIPS 199,200
    • DITSCAP/DIACAP
    • NIACAP
    • HIPAA
  • ST&E Testing of the above standards
slide11
C&A
  • Life Cycle Certification Support
    • Definition
    • Verification
    • Validation
    • Post-Accreditation
  • Certification Audit Support
vulnerability scanning
Vulnerability Scanning

Checks for known vulnerabilities

Work closely with customer to identify scope and depth of scanning

Generally, systems are checked for known exploits and vulnerabilities

Work with customer to mitigate and mediate identified risks

Assist in solution development and implementation

penetration testing
Penetration Testing

In depth probing and testing

Exploit unknown or unpublished vulnerabilities

Requires more time and higher skilled people

application testing
Application Testing

Achilles heel of service-oriented architecture

Applications are key to leveraging benefits of information systems

Create the greatest risk

Extensive code

Chance of insecure or exploitable code being created

managed enterprise security services16
Managed Enterprise Security Services

Firewalls

Routers

Intrusion Detection Systems

Intrusion Prevention Systems

Incident Response

firewalls and routers
Firewalls and Routers
  • Monitoring & Compliance
    • Log analysis
    • Configuration review and assessment
  • Configuration updates and adjustments
  • Rule testing and evaluation
intrusion detection systems intrusion prevention systems
Intrusion Detection Systems & Intrusion Prevention Systems
  • Manage and monitor IPS/IDS
    • Monitor network traffic for:
    • Hostile network activity
    • Ex-fill of sensitive information
    • Policy enforcement and violation
      • PII disclosure
      • Plain Text
    • Respond to alerts (IR)
computer forensic services
Computer Forensic Services

Mobile Forensics

Network Forensics

Intrusion Investigations

Incident Response

network forensics
Network Forensics

Wiretaps

Packet analysis

Server data acquisition

Live data collection

Data validation

21

multiple training courses
Multiple Training Courses

Computer Forensics

Linux Forensics

Mobile Forensics

Network Forensics

Intrusion Investigations

Internet Investigations

Wire Taps

training clients
Training Clients

DCITP- Defense Computer Investigations Training Program for DoD

Department of State

George Washington University

Internal Revenue Service

Regional Computer Forensics Group

Federal Bureau of Investigations

SOCOM

24

slide26
IRS
  • SPAWAR Systems Center Charleston
    • Performing ST&E
    • Testing:
      • FISMA Standards
      • NIST 800-53, 800-53A
      • FIPS 199, 200 
      • Technology: Cisco, Unix, Microsoft, MSSQL 2000, MSSQL 2005, and Oracle 10.1(g)
department of navy
Department of Navy
  • SPAWAR - Navy Medicine Enterprise Security Operations Center
    • Router and Firewall security
    • Management and monitoring support
    • Policy compliance with SOP
    • Develop and document operating policies and procedures
work experience
Work Experience
  • IRS
  • USDA
  • Department of Navy
  • HQ, FIRST U.S. ARMY
  • SAIC
  • Commercial Banks
  • Unions
work experience29
Work Experience
  • FBI
  • OIG Philadelphia
  • Philadelphia PD IA
  • Large Prime Contractors
  • Law Firms & Private Investigative Firms
  • Commercial Banks
  • Commercial Businesses

29

certifications education
CFCE

CCE

EnCE

GIAC (SANS)

MCSE

CISSP

CCNA

CCSP

Security+

CCNP + Security

MA Sociology/Criminology

MS Information Systems

Certifications & Education
expert testimony
Expert Testimony
  • Certified Expert Computer Forensics
  • Certified Expert Mobile Forensics
  • Certified Witness Edged Weapons

32

customer satisfaction
Customer Satisfaction
  • We have had outstanding performance reviews from our customers
  • We place appropriately skilled, technically proficient security engineers
  • We have several teaming opportunities on large, upcoming projects
upcoming projects
Upcoming Projects
  • Support C&A efforts for Marine Corps
  • Increase support on Navy Medicine Enterprise Security Operations Center
  • Intrusion Prevention/Detection
  • Incident Response
  • Manage Computer Forensics Lab
  • Provide computer forensic and incident response support to government SOC/NOC
goals
Goals
  • Achieve prime contractor status
    • Start small and grow
  • Stay up-to-date on certifications and education
  • Continue to provide our customers with

Quality of Service and Customer Satisfaction

why choose nss
Why Choose NSS
  • Network Security is in our name & is what we do
  • Skilled and Certified Security Engineers
  • Strong Past Performance & Notable Responsiveness
our contact information
Our Contact Information

VA office: 2106 Harbor Drive, Greenbackville, VA 23356

SC office:1156 Bowman Rd, #200, Mt. Pleasant, SC 29464

Phone: 703-319-0411 or 843-416-1196

Fax: 866-670-1961

President: (Ms) Alexei Haughom

Email: [email protected]

Website: www.network-securityservices.com

ad