top of page

Additional Services

We provide Information Security Assessment services customized to a business’s needs. The staff consists of senior experts with experience in the commercial sector, the intelligence community, the Department of Defense, Homeland Security, and other government sectors.

The following list of services represent commonly requested capabilities, but CPVI also provides customized offerings.

Computer Chip

Security Policy Development

  • Provide Contingency and Continuity of Operations (COOP) planning to minimize loss of data and infrastructure ensuring the availability of business functions

  • Perform gap analysis on the IT operational environment to identify compliance with established policies and guidelines

  • Identify and develop risk mitigations to support business decisions

image.png

Security Assessment and Authorization

  • Identify system categorization and applicable security controls

  • Implement and document security controls

  • Coordinate Security Assessment activities

  • Develop Security Test Procedures to ensure security controls are in place and functioning as intended

  • Perform Security Assessments

  • Identify continuous monitoring activities post authorization

skills and qualifications needed for a career in cyber security.webp

Threat Assessment

  • Identify relevant internal and external vulnerabilities to an organization and the potential threats associated with them

  • Assess impact to the organization that may occur given the potential for threats that may exploit vulnerability

  • Assess risk based on the expected harm and likelihood of harm occurring from identified vulnerabilities and associated potential for exploitation

  • Provide recommendations for improving the security of an organization or IT system

Computer Chip

Disaster Loss Prevention

  • Properly classify and understand the protection requirements of the business data

  • Help implement a security-aware culture where protecting data is critical to all employees

  • Provide the training that employees need to know in order to keep data secure

  • Help implement necessary technical controls to protect the data from potential threats

  • Monitor and audit both internal and external user activity to maintain a continuous awareness of the threat environment

  • Develop and help enforce security policies based on relevant threats and that are integrated with business processes and aligned with appropriate roles and responsibilities

  • Help ensure clear leadership through executive commitment and visibility

  • Develop an incident-handling process

image.png

Identity and Access Management

  • Define security policies and guidelines that establish processes for data access privileges

  • Deliver the necessary infrastructure components to support authentication

  • Assist with the development of processes and procedures for access control including establishing, modifying and revoking user accesses

  • Identify and help implement tools for auditing and monitoring access activity

  • Assist data owners in specifying the access control levels and permissions required to access data

CMMC Domains

CPVI also provides services in the following areas:

bottom of page