Cybersecurity Operations
Information security, an integral and indispensable part of all mission operations, involves ongoing planning, assessment, protection, detection, response, mitigation, and training. ERT brings the full range of defensive cyber security capabilities to protect and secure our customers information assets and mission applications.
- Risk Management: ERT security experts work with customers to develop, review, and maintain system security and continuity of operations plans, policies, procedures, and best practices to effectively identify and manage system and mission risks.
- Network Defense: From Defense-in-Depth to Zero Trust Networks to Continuous Diagnostics and Mitigation, ERT has experience implementing the appropriate design, monitoring and control tools, incident response and countermeasures, and security procedures to protect system boundaries, interfaces, and access.
- Information Assurance: ERT IA practitioners help ISSOs and ISSMs to achieve and maintain system compliance through our expertise in evaluating and managing security controls and conducting independent verification and validation (IV&V) through vulnerability scans and penetration tests.
- DevSecOps: ERT tailors our Agile DevSecOps methodologies to effectively integrate security with software development and IT infrastructure operations and ensure security practices and requirements are incorporated into every step of the system and software development lifecycle process.