Requirements Definition and Analysis:

  • Regulatory / Industry Standards
  • Threat Modeling
  • Cyber Program Prioritization

Secure Design and Development:

  • Security Architecture
  • Disaster Recovery and Capacity Planning
  • Static Code Analysis

Testing and Verification:

  • Third Party Vendor Assessments
  • Security Controls Validation
  • Residual Risk Analysis