Small business showcase network security services llc l.jpg
1 / 38

SMALL BUSINESS SHOWCASE NETWORK SECURITY SERVICES LLC.


47 views
Uploaded on:
Category: Animals / Pets
Description
SMALL BUSINESS SHOWCASE NETWORK SECURITY SERVICES LLC. Small Business Size: SBA Certified 8(a), HUBZone, WO, SDB Niche Areas: Computer Forensics & Managed Security IRS/Treasury Contracts: Subcontractor on IRS MITS Cyber Security, Office of the ACIO
Transcripts
Slide 1

Little BUSINESS SHOWCASE NETWORK SECURITY SERVICES LLC Small Business Size: SBA Certified 8(a), HUBZone, WO, SDB Niche Areas: Computer Forensics & Managed Security IRS/Treasury Contracts: Subcontractor on IRS MITS Cyber Security, Office of the ACIO Prime contractual worker on IRS Cyber Security Training, Electronic Crimes Unit Largest honor: $415,000 Largest Company Award: Amount: Incrementally financed; as of now at $415,000 Customer: Govt: SPAWAR Charleston. Prime: Honeywell Technology Solutions, Inc.

Slide 2

Who We Are SBA Certified 8(a) and HUBZone, Woman-Owned little business GSA Schedule 70 Prime Contractor Seaport-E Prime Contractor Provider of most abnormal amount of IT security arrangements

Slide 3

Who We Are Security Team's Qualifications Backgrounds in: Law Enforcement/Military Intelligence Federal Agencies Prestigious Commercial Businesses High levels of instruction & affirmations

Slide 4

NSS Founder Background Law Enforcement Officer (19 years experience) Detective Computer Crime Investigations Commercial Field DCITP, Lead Instructor for Network Investigations & Intrusions Ernst & Young, Director of Incident Response, National Forensics Lab Fiderus Inc., Director of Incident Response & Penetration Testing

Slide 5

Core Competencies Information Assurance Services Managed Enterprise Security Services Computer Forensics Network Investigations Computer Forensics Training

Slide 6

What We Offer Information Assurance Services Certification and Accreditation Risk & Vulnerability Assessments Disaster Recovery and Policy Development Managed Security Services Firewalls/Routers IDS/IPS Incident Response Computer Forensic Investigative Services Computer Crime Investigative Training

Slide 7

Information Assurance

Slide 8

Information Assurance Services Information Assurance (IA) Certification & Accreditation Vulnerability Assessments Penetration Testing Application Testing

Slide 9

C&A The Federal Information Security Management Act (FISMA) Compliance with FISMA requires master security examination and assessment abilities and an exhaustive comprehension of the FISMA prerequisites

Slide 10

C&A NSS Security Experts help and guide in the consistence of endeavors for the accompanying principles: FISMA NIST 800 arrangement FIPS 199,200 DITSCAP/DIACAP NIACAP HIPAA ST&E Testing of the above guidelines

Slide 11

C&A Life Cycle Certification Support Definition Verification Validation Post-Accreditation Certification Audit Support

Slide 12

Vulnerability Scanning Checks for known vulnerabilities Work intimately with client to recognize degree and profundity of filtering Generally, frameworks are checked for known adventures and vulnerabilities Work with client to relieve and intercede distinguished dangers Assist in arrangement improvement and usage

Slide 13

Penetration Testing inside and out examining and testing Exploit obscure or unpublished vulnerabilities Requires additional time and higher gifted individuals

Slide 14

Application Testing Achilles heel of administration situated design Applications are critical to utilizing advantages of data frameworks Create the most serious danger Extensive code Chance of unreliable or exploitable code being made

Slide 15

Managed Enterprise Security Services

Slide 16

Managed Enterprise Security Services Firewalls Routers Intrusion Detection Systems Intrusion Prevention Systems Incident Response

Slide 17

Firewalls and Routers Monitoring & Compliance Log investigation Configuration survey and appraisal Configuration redesigns and modification Rule testing and assessment

Slide 18

Intrusion Detection Systems & Intrusion Prevention Systems Manage and screen IPS/IDS Monitor system movement for: Hostile system action Ex-fill of delicate data Policy authorization and infringement PII exposure Plain Text Respond to alarms (IR)

Slide 19

Computer Forensics

Slide 20

Computer Forensic Services Mobile Forensics Network Forensics Intrusion Investigations Incident Response

Slide 21

Network Forensics Wiretaps Packet examination Server information procurement Live information accumulation Data acceptance 21

Slide 22

Computer Crime Investigative Training

Slide 23

Multiple Training Courses Computer Forensics Linux Forensics Mobile Forensics Network Forensics Intrusion Investigations Internet Investigations Wire Taps

Slide 24

Training Clients DCITP-Defense Computer Investigations Training Program for DoD Department of State George Washington University Internal Revenue Service Regional Computer Forensics Group Federal Bureau of Investigations SOCOM 24

Slide 25

Current Projects

Slide 26

IRS SPAWAR Systems Center Charleston Performing ST&E Testing: FISMA Standards NIST 800-53, 800-53A FIPS 199, 200  Technology: Cisco, Unix, Microsoft, MSSQL 2000, MSSQL 2005, and Oracle 10.1(g)

Slide 27

Department of Navy SPAWAR - Navy Medicine Enterprise Security Operations Center Router and Firewall security Management and observing bolster Policy consistence with SOP Develop and archive working strategies and methodology

Slide 28

Work Experience IRS USDA Department of Navy HQ, FIRST U.S. Armed force SAIC Commercial Banks Unions

Slide 29

Work Experience FBI OIG Philadelphia PD IA Large Prime Contractors Law Firms & Private Investigative Firms Commercial Banks Commercial Businesses 29

Slide 30

The NSS Security Team

Slide 31

CFCE CCE EnCE GIAC (SANS) MCSE CISSP CCNA CCSP Security+ CCNP + Security MA Sociology/Criminology MS Information Systems Certifications & Education

Slide 32

Expert Testimony Certified Expert Computer Forensics Certified Expert Mobile Forensics Certified Witness Edged Weapons 32

Slide 33

Customer Satisfaction We have had exceptional execution audits from our clients We put fittingly talented, in fact capable security engineers We have a few joining open doors on expansive, up and coming tasks

Slide 34

Future of NSS

Slide 35

Upcoming Projects Support C&A endeavors for Marine Corps Increase support on Navy Medicine Enterprise Security Operations Center Intrusion Prevention/Detection Incident Response Manage Computer Forensics Lab Provide PC scientific and episode reaction backing to government SOC/NOC

Slide 36

Goals Achieve prime temporary worker status Start little and develop Stay progressive on affirmations and instruction Continue to give our clients Quality of Service and Customer Satisfaction

Slide 37

Why Choose NSS N etwork Security is in our name & is our main thing S slaughtered and Certified Security Engineers S trong Past Performance & Notable Responsiveness

Slide 38

Our Contact Information VA office: 2106 Harbor Drive, Greenbackville, VA 23356 SC office: 1156 Bowman Rd, #200, Mt. Wonderful, SC 29464 Phone: 703-319-0411 or 843-416-1196 Fax: 866-670-1961 President: (Ms) Alexei Haughom Email: alex@netsec.cc Website: www.network-securityservices.com