top of page

Additional Services

We provide Information Security Assessment services customized to a business’s needs. The staff consists of senior experts with experience in the commercial sector, the intelligence community, the Department of Defense, Homeland Security, and other government sectors.

​

The following list of services represent commonly requested capabilities, but CPVI also provides customized offerings.

Computer Chip

Security Policy Development

  • Provide Contingency and Continuity of Operations (COOP) planning to minimize loss of data and infrastructure ensuring the availability of business functions

  • Perform gap analysis on the IT operational environment to identify compliance with established policies and guidelines

  • Identify and develop risk mitigations to support business decisions

image.png

Security Assessment and Authorization

  • Identify system categorization and applicable security controls

  • Implement and document security controls

  • Coordinate Security Assessment activities

  • Develop Security Test Procedures to ensure security controls are in place and functioning as intended

  • Perform Security Assessments

  • Identify continuous monitoring activities post authorization

skills and qualifications needed for a career in cyber security.webp

Threat Assessment

  • Identify relevant internal and external vulnerabilities to an organization and the potential threats associated with them

  • Assess impact to the organization that may occur given the potential for threats that may exploit vulnerability

  • Assess risk based on the expected harm and likelihood of harm occurring from identified vulnerabilities and associated potential for exploitation

  • Provide recommendations for improving the security of an organization or IT system

Computer Chip

Disaster Loss Prevention

  • Properly classify and understand the protection requirements of the business data

  • Help implement a security-aware culture where protecting data is critical to all employees

  • Provide the training that employees need to know in order to keep data secure

  • Help implement necessary technical controls to protect the data from potential threats

  • Monitor and audit both internal and external user activity to maintain a continuous awareness of the threat environment

  • Develop and help enforce security policies based on relevant threats and that are integrated with business processes and aligned with appropriate roles and responsibilities

  • Help ensure clear leadership through executive commitment and visibility

  • Develop an incident-handling process

image.png

Identity and Access Management

  • Define security policies and guidelines that establish processes for data access privileges

  • Deliver the necessary infrastructure components to support authentication

  • Assist with the development of processes and procedures for access control including establishing, modifying and revoking user accesses

  • Identify and help implement tools for auditing and monitoring access activity

  • Assist data owners in specifying the access control levels and permissions required to access data

CMMC Domains

​CPVI also provides services in the following areas:

bottom of page