Goods and Services | Cyber strategy design services, namely, security audits and risk assessments of networks, IT infrastructures, end points, industrial networks, web server infrastructures, organization policies, training levels, security operations capabilities and organizational procedures; cyber-incident and cyber-attack response services, including identifying, containing, analyzing, mitigating and reporting cyber-incidents and cyber-attacks; cyber-attack simulation services; ethical hacking and penetration testing; cyber-security technology research services, including cyber-threat landscape analyses, defensive and offensive cyber tactics, techniques and procedures of advanced threat actors and emerging technologies; cyber support services, namely, in the fields of cyber systems, communications, infrastructures, penetration testing and governance, risk and compliance consulting; cyber monitoring services, including real time analysis, ongoing cyber-attack and cyber campaign identification within a network; IT security services for systems, networks, communications, infrastructure, and applications including risk assessments, penetration testing and application security reviews, application security audits, and information security code reviews; cyber security training services, including providing training to identify, detect, and handle cyber-attacks; training services to develop professional defensive, forensic, and penetration tester skills including detecting, containing, isolating, refining, analyzing, and exploiting the understanding of system vulnerabilities; cyber solutions services, including integration of cyber security products; Industrial Control Systems and SCADA security consultancy, training, and research services; real-time security assessments of SCADA, DCS, EMS, and process control system environments; cybersecurity testing services for Industrial Control System and SCADA infrastructures; Industrial Control Systems and SCADA security consultancy services including risk assessments, risk classification, threat identification, security control selection, standards compliance, system design reviews, pre-commissioning testing, commissioning assistance, site audits, incident response and solutions and integration; compliance and procedure services in the fields of communications networks, systems, system applications and mechanisms; implementation of security standards, including health informatic security standards |