WE EXCEL IN CYBER SECURITY, NETWORK IMPLEMENTATION, SUPPLY CHAIN MANAGEMENT, and PROJECT MANAGEMENT
SERVICE OFFERINGS
Information Assurance
Our consultants implement security policy and procedures that protect information systems, computer systems and networks. We work to maintain confidentiality, integrity, availability, authentication, and nonrepudiation in line with applicable laws, directives, Executive Orders, policies, national standards, or regulations.
Cybersecurity Assessments
Our consultants conduct Security Control Assessments (SCAs) on your information system, computer system, and network. An SCA will test and evaluate the management, operational, and technical security controls in an information system to determine the extent to which the controls are implemented correctly based on the National Institute of Standards and Technology (NIST) and industry best practices. TechEdge, LLC will help determine if the controls are operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system.
Penetration Testing
Our consultants will conduct penetration testing with your written consent and on agreed terms to strengthen your security posture against malicious hackers, threats to data , personally identifiable information (PII), and privacy. Short phrased as “pen test,“ we will perform a simulated cyber attack against your computer system to check for exploitable vulnerabilities and identify security gaps.
Risk Management Framework Implementation
Our consultants will implement the NIST Risk Management Framework (RMF) which is a risk-based approach that integrates security and risk management activities into the system development lifecycle. RMF is a risk-based approach to security control selection and specification that considers effectiveness, efficiency, and constraints due to applicable laws, directives, Executive Orders, policies, standards, or regulations. Within the RMF implementation we will work to ensure that NIST Special Publication 800-series is incorporated in each step tailored to your effort, project and organizational goals. We also support assessment and authorization (A&A)/ certification and accreditation (C&A) to ensure your systems get a full Authority to Operate from the Authorizing Official (AO).
Information System Security Documentation
Our consultants will work with your stakeholders to identify your organizational requirements and assist and develop information security documentation. The examples of information system security documentation that might be required by your organization include but not limited to the following:
Information System Contingency Plans (ISCPs)
System Security Plans (SSPs)
Notification of Change (NOC)
Planned Change Comparafive Analysis (PCCAs)
Privacy Impact Assessments
Security Categorization Forms
e-Authentication Risk Assessments
Security Assessment Results Briefings for executive-level audiences
Authorization Boundary
Supply Chain Management
Our consultants will help you identify hardware, software and other needed supplies to ensure your organization is reaching optimal performance. We support the armed services, state, local, federal and tribal governments.