IT & Cyber Capabilities

Cybersecurity Solutions

Threats to information and infrastructures continue to advance at an alarming rate. Software is a primary vector. Our customers’ missions require cybersecurity capabilities that secure critical data and protect national and corporate assets. They need dynamic cyber defense strategies, and the benefit of deep research and knowledge of offensive cyber techniques and the mechanisms to counter them in real time. We serve both federal and commercial customers.

Cybersecurity Operations
Testing & Regulatory Compliance Assessments
Test and Evaluation, Including High Assurance Evaluations and Trusted Delivery
Incident Response and Digital Forensics
Information Operations

RCI provides cybersecurity support services to military, government and commercial clients. Designed to work within customers’ IT infrastructures, our services provide value through hands-on involvement with the technologies at the heart of today’s complex information systems, maintaining vendor neutrality. Our services include: 

  • Comprehensive Vulnerability and Risk Assessments 
  • Compliance Testing and Standards-Based Deep Penetration Testing 
  • Incident Response, including forensic investigation and analysis 
  • 24/7 Network Security Monitoring and Security Operations Center Operations 
  • PCI-DSS Audits 
  • Security Engineering, including comprehensive test and evaluation 
  • Full-Spectrum Test and Evaluation, including Deep Security Evaluations 
  • Supply Chain Security 

RCI provides compliance and audit support services to a wide array of large, medium and small financial sector entities. RCI provides the full array of required PCI compliance testing, including penetration testing, vulnerability assessments, vulnerability management, segmentation testing and other elements. RCI provides these or similar services for an extensive array of other compliance frameworks, including CMMC and other NIST standards, HIPPA, TPRM, and M&A, among others. 

Threats to IT and Critical Infrastructure continue to advance at an alarming rate. Critical industries targeted include Government, Finance, Energy, Food Processing and Telecommunications. RCI provided the Independent High Assurance Evaluations and Trusted Delivery (HATD) Program to multiple customers, including a US Tier 1 Carrier and a major telecommunications vendor. RCI developed the policy framework and methodology required to implement the methodology and continues to mature it to counter constantly evolving Advanced Persistent Threats (APTs), including very dangerous ransomware attacks.
High Assurance Evaluation includes: 
  • Comprehensive, standards-based assessment of SW, FW, HW
  • Threat-driven approach
  • Static and dynamic testing and analysis of source code, firmware and binaries
  • System level vulnerability testing
  • Hardware analysis, testing and validation
Trusted Delivery includes: 
  • Validation of software binaries being delivered for deployment
    Countermeasures against supply chain integrity breaches
    Integration into patch and new release deployment processes
  • Continuous verification, pre-deployment checks and field testing
RCI executes a wide array of incident response engagements that have included investigations, litigation support, remediation of cyber breaches, documentation of data leaks and exfiltration, malware detection, analysis and mitigation and IP theft. We use both industry standard and customized forensics tools tailored to unique customer requirements, which are applied using established best practices and processes to ensure process and data integrity. These engagements often involve: 
  • Execution of the full incident response cycle, including 24/7 onsite support 
    Incident response planning support 
    Forensics preservation/collection of smartphones, laptops, desktops, servers, other devices and cloud-based applications 
    Forensic Analysis: experts examine the electronic footprints left by others; substantiate activities; offer explanations for activities 
    Processing: extract data and produce in understandable formats; provide memos or reports of findings 
  • Expert Witness: provide affidavit or court room testimony on digital forensics 
RCI also provides a range of services that are designed to proactively neutralize Advanced Persistent Threat (APT) actors, prior to their ability to weaponize attack tools against our customers. This includes a “Brand Protection” component that serves to protect the reputations of our clients. 
From the beginning of Information Operations (“IO”) – Information Warfare, Command and Control Warfare – to today’s IO, RCI has helped define IO principles and concepts, as well as IO tactics, techniques, and procedures (TTP). RCI has provided support to Joint staffs, Service staffs and component/MACOM level staffs. RCI subject matter experts have contributed extensively to Joint IO doctrine (JP3-13) and Army Field Manual (FM) 3-13: Information Operations: Doctrine, Tactics, Techniques, and Procedures. RCI also establishes doctrine and TTP for the IO elements of operations security and military deception. In addition, RCI has developed and taught IO in various formal Army and Joint forums including the Combined Arms Center at Fort Leavenworth or at other locations depending on deploying unit requirements. 
RCI Services and Capabilities include: 
  • Doctrine development and support
  • Staff Augmentation 
  • Information Sharing and Analysis 
  • IO Training 

Get in Touch

Get in touch with us today to learn more about our cybersecurity solutions.