Capabilities
ACT Integrity Consulting, Incorporate is Information Technology (IT) operations, Program Management, Cyber Security, Risk Management, Information Security, Continuity of Operations, and Information Assurance (IA) company that provides innovative services and solutions for out clients' specific business needs. Each of our consultants is personally accountable for honesty in all aspects of our work and treats everyone with dignity and respect, regardless of your position.
Our Consultants, Engineers, and Security Professionals have the expertise, knowledge and experience to deal with the dynamic Cyber Security challenges in today's environment. Protecting information assets is a complex and multi-faceted challenge, with those responsible seemingly confronted with ever-increasing threats, risks and vulnerabilities. Our Consultants will work with our clients to overcome this threat by ensuring that we provide the appropriate Risk Management and Analysis. We follow the industry’s best business practice in our Cyber Security approach in developing effective and efficient solutions and services including but not limited to IT and IA Governance, Information System (IS) Management Controls, Auditing Management, Cyber Security and Information Assurance (IA), Program Management and Operations, and Strategic Planning.
·“…Through the process of risk management, leaders must consider risk to US interests from adversaries using cyberspace to their advantage and from our own efforts to employ the global nature of cyberspace to achieve objectives in military, intelligence, and business operations… “
“…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated in order to identify important trends and decide where effort should be applied to eliminate or reduce threat capabilities; eliminate or reduce vulnerabilities; and assess, coordinate, and deconflict all cyberspace operations…”
“…Leaders at all levels are accountable for ensuring readiness and security to the same degree as in any other domain…"
-- The National Strategy for Cyberspace Operations - Officer of the Chairman, Joint Chiefs of Staff, U.S. Department of Defense.
ACT Integrity Consultants, Engineers, and Security Professionals have the following functional and technical capabilities from Governance (policies, regulations, Laws and compliance), IS Control and Audit management (Projects, Technology and Operations), Program and Project Management, to Cyber Security and IS Strategic Planning.
Governance (Policy, Legal & Compliance)
o Federal Information Security Management Act (FISMA)
o Office of Management and Budget [OMB] Circular A-130, Management of Federal Information Resource
o DOD 8570 – Information Assurance (IA) Training, Certification, and Workforce Management
o Director of Central Intelligence Directive (DCID) 6/3
o DoD 8570.01-M - Information Assurance Workforce Improvement Program
o OMB Circular A-11 Preparation, Submission, and execution of the Budget
o Health Insurance Portability and Accountability Act (HIPAA)
o DOD 8570 – Information Assurance (IA) Training, Certification, and Workforce Management
o Personally Identifiable Information (PII)
o Gramm-Leach-Bliley Act (GLBA)
o Clinger-Cohen Act
o Privacy Act
o Sarbanes-Oxley (SOX)
o International Organization for Standardization (ISO) 27000 series
o Appendix III: Security Of Federal Automated Information Resources
o Homeland Security Presidential Directive-12 [HSPD-12],Common Identification Standard for Federal Employees and Contractors
o Homeland Security Presidential Directive
o International Organization for Standardization (ISO) 20000
o National Institute of Technology (NIST )
o Special Publications (SP)
o Federal Information Processing Standards (FIPS)
o Control Objectives for Information and Related Technology (COBIT) 4.1 and 5.0
o Security Information and Event Management (SIEM) solutions
o Intelligence Community Directive (ICD) 503
o Homeland Security Presidential Directive
IS Management Controls and Auditing Management (Projects, Technology & Operations)
o Information Security Management Controls
o Auditing Management
·
Management – Project and Operations
o Information Assurance (IA) Program Management
o Certification and Accreditation (C&A) (NIST, DIACAP, NIACAP, DCID 6/3)
o Operational & IA Security Controls Management
o System and Software Development Lifecycle (SDLC) Management
o Incident and Emergency Response Operations and Management
o System Security Plans & Plans of Operations And Milestones (POA&M)
Cyber Security Core Competencies
o Access Control
o Social Engineering, Phishing Attacks, Identity Theft
o Physical Security
o Risk Management
o Disaster Recovery and Business Continuity of Operations Planning
o Firewall, IDS/IPS and Network Defense Systems
o Wireless Security
o Virus, Trojans and Malware Threats
o Secure Coding Best Practices and Securing Web Applications
o Vulnerability Assessment And Penetration Testing
o Computer Forensics And Incident Response
Strategic Planning
o Strategic Planning
Our Consultants, Engineers, and Security Professionals holds the industry’s most prestigious and recognized certifications in Cyber Security, Information Assurance (IA), Risk Management, Disaster Recovery Planning, Domestic Preparedness, Continuity of Operation Planning (COOP), and Information Technology (IT) Certifications:
Certified Chief Information Officer (CIO)
Certified Chief Information Security Officer (C|CISO)
Certified Information Security Manager (CISM)
Certified Information System Security Professional (CISSP)
·
Certified Business Manager (CBM)
Project Management Professional (PMP)
·
Certified Senior Recovery Planner (SRP)
·
Certified Recovery Planner (CRP)
Certified in Risk and Information System Control (CRISC)
·
Information Technology Information Library Foundation Version 3 (ITILv3)
·
Certified FISMA Compliancy Professional (CFCP)
Communications Security Manager (COMSEC)
·
NSA Certified, INFOSEC Assessment Methodology (IAM) professional
DoD Certified Information System Security Instructor
·
DISA Defense Information Assurance Certification and Accreditation Program (DIACAP)
·
National Information Assurance Certification and Accreditation Program (NIACAP)
·
DISA - Information System Security Program Manager (ISSPM)
·
DISA - Information System Security Manager (ISSM)
·
DISA Information System Security Officer (ISSO)
Our Consultants, Engineers, and Security Professionals have the expertise, knowledge and experience to deal with the dynamic Cyber Security challenges in today's environment. Protecting information assets is a complex and multi-faceted challenge, with those responsible seemingly confronted with ever-increasing threats, risks and vulnerabilities. Our Consultants will work with our clients to overcome this threat by ensuring that we provide the appropriate Risk Management and Analysis. We follow the industry’s best business practice in our Cyber Security approach in developing effective and efficient solutions and services including but not limited to IT and IA Governance, Information System (IS) Management Controls, Auditing Management, Cyber Security and Information Assurance (IA), Program Management and Operations, and Strategic Planning.
·“…Through the process of risk management, leaders must consider risk to US interests from adversaries using cyberspace to their advantage and from our own efforts to employ the global nature of cyberspace to achieve objectives in military, intelligence, and business operations… “
“…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated in order to identify important trends and decide where effort should be applied to eliminate or reduce threat capabilities; eliminate or reduce vulnerabilities; and assess, coordinate, and deconflict all cyberspace operations…”
“…Leaders at all levels are accountable for ensuring readiness and security to the same degree as in any other domain…"
-- The National Strategy for Cyberspace Operations - Officer of the Chairman, Joint Chiefs of Staff, U.S. Department of Defense.
ACT Integrity Consultants, Engineers, and Security Professionals have the following functional and technical capabilities from Governance (policies, regulations, Laws and compliance), IS Control and Audit management (Projects, Technology and Operations), Program and Project Management, to Cyber Security and IS Strategic Planning.
Governance (Policy, Legal & Compliance)
o Federal Information Security Management Act (FISMA)
o Office of Management and Budget [OMB] Circular A-130, Management of Federal Information Resource
o DOD 8570 – Information Assurance (IA) Training, Certification, and Workforce Management
o Director of Central Intelligence Directive (DCID) 6/3
o DoD 8570.01-M - Information Assurance Workforce Improvement Program
o OMB Circular A-11 Preparation, Submission, and execution of the Budget
o Health Insurance Portability and Accountability Act (HIPAA)
o DOD 8570 – Information Assurance (IA) Training, Certification, and Workforce Management
o Personally Identifiable Information (PII)
o Gramm-Leach-Bliley Act (GLBA)
o Clinger-Cohen Act
o Privacy Act
o Sarbanes-Oxley (SOX)
o International Organization for Standardization (ISO) 27000 series
o Appendix III: Security Of Federal Automated Information Resources
o Homeland Security Presidential Directive-12 [HSPD-12],Common Identification Standard for Federal Employees and Contractors
o Homeland Security Presidential Directive
o International Organization for Standardization (ISO) 20000
o National Institute of Technology (NIST )
o Special Publications (SP)
o Federal Information Processing Standards (FIPS)
o Control Objectives for Information and Related Technology (COBIT) 4.1 and 5.0
o Security Information and Event Management (SIEM) solutions
o Intelligence Community Directive (ICD) 503
o Homeland Security Presidential Directive
IS Management Controls and Auditing Management (Projects, Technology & Operations)
o Information Security Management Controls
o Auditing Management
·
Management – Project and Operations
o Information Assurance (IA) Program Management
o Certification and Accreditation (C&A) (NIST, DIACAP, NIACAP, DCID 6/3)
o Operational & IA Security Controls Management
o System and Software Development Lifecycle (SDLC) Management
o Incident and Emergency Response Operations and Management
o System Security Plans & Plans of Operations And Milestones (POA&M)
Cyber Security Core Competencies
o Access Control
o Social Engineering, Phishing Attacks, Identity Theft
o Physical Security
o Risk Management
o Disaster Recovery and Business Continuity of Operations Planning
o Firewall, IDS/IPS and Network Defense Systems
o Wireless Security
o Virus, Trojans and Malware Threats
o Secure Coding Best Practices and Securing Web Applications
o Vulnerability Assessment And Penetration Testing
o Computer Forensics And Incident Response
Strategic Planning
o Strategic Planning
Our Consultants, Engineers, and Security Professionals holds the industry’s most prestigious and recognized certifications in Cyber Security, Information Assurance (IA), Risk Management, Disaster Recovery Planning, Domestic Preparedness, Continuity of Operation Planning (COOP), and Information Technology (IT) Certifications:
Certified Chief Information Officer (CIO)
Certified Chief Information Security Officer (C|CISO)
Certified Information Security Manager (CISM)
Certified Information System Security Professional (CISSP)
·
Certified Business Manager (CBM)
Project Management Professional (PMP)
·
Certified Senior Recovery Planner (SRP)
·
Certified Recovery Planner (CRP)
Certified in Risk and Information System Control (CRISC)
·
Information Technology Information Library Foundation Version 3 (ITILv3)
·
Certified FISMA Compliancy Professional (CFCP)
Communications Security Manager (COMSEC)
·
NSA Certified, INFOSEC Assessment Methodology (IAM) professional
DoD Certified Information System Security Instructor
·
DISA Defense Information Assurance Certification and Accreditation Program (DIACAP)
·
National Information Assurance Certification and Accreditation Program (NIACAP)
·
DISA - Information System Security Program Manager (ISSPM)
·
DISA - Information System Security Manager (ISSM)
·
DISA Information System Security Officer (ISSO)