IT & Cyber Capabilities
Cybersecurity Solutions
Threats to information and infrastructures continue to advance at an alarming rate. Software is a primary vector. Our customers’ missions require cybersecurity capabilities that secure critical data and protect national and corporate assets. They need dynamic cyber defense strategies, and the benefit of deep research and knowledge of offensive cyber techniques and the mechanisms to counter them in real time. We serve both federal and commercial customers.
RCI provides cybersecurity support services to military, government and commercial clients. Designed to work within customers’ IT infrastructures, our services provide value through hands-on involvement with the technologies at the heart of today’s complex information systems, maintaining vendor neutrality. Our services include:
- Comprehensive Vulnerability and Risk Assessments
- Compliance Testing and Standards-Based Deep Penetration Testing
- Incident Response, including forensic investigation and analysis
- 24/7 Network Security Monitoring and Security Operations Center Operations
- PCI-DSS Audits
- Security Engineering, including comprehensive test and evaluation
- Full-Spectrum Test and Evaluation, including Deep Security Evaluations
- Supply Chain Security
RCI provides compliance and audit support services to a wide array of large, medium and small financial sector entities. RCI provides the full array of required PCI compliance testing, including penetration testing, vulnerability assessments, vulnerability management, segmentation testing and other elements. RCI provides these or similar services for an extensive array of other compliance frameworks, including CMMC and other NIST standards, HIPPA, TPRM, and M&A, among others.
- Comprehensive, standards-based assessment of SW, FW, HW
- Threat-driven approach
- Static and dynamic testing and analysis of source code, firmware and binaries
- System level vulnerability testing
- Hardware analysis, testing and validation
-
Validation of software binaries being delivered for deploymentCountermeasures against supply chain integrity breachesIntegration into patch and new release deployment processes
-
Continuous verification, pre-deployment checks and field testing
-
Execution of the full incident response cycle, including 24/7 onsite supportIncident response planning supportForensics preservation/collection of smartphones, laptops, desktops, servers, other devices and cloud-based applicationsForensic Analysis: experts examine the electronic footprints left by others; substantiate activities; offer explanations for activitiesProcessing: extract data and produce in understandable formats; provide memos or reports of findings
-
Expert Witness: provide affidavit or court room testimony on digital forensics
-
Doctrine development and support
-
Staff Augmentation
-
Information Sharing and Analysis
-
IO Training
Get in Touch
Get in touch with us today to learn more about our cybersecurity solutions.