Federal departments and agencies (D&As) need innovative cybersecurity and privacy (CS&P) approaches, methodologies, and best practices that address interoperability, usability, and privacy adapted to their unique mission and business environment. To secure the Confidentiality, Integrity, and Availability of our customers’ networks and systems today while continuously evolving to defeat the cyber threats of tomorrow, Criterion has invested in leading edge solutions and resources, including:
Cybersecurity Center of Excellence (CoE) – Leveraging the combined expertise of our 250+ certified/cleared cybersecurity professionals, Criterion’s Cyber CoE establishes and maintains best practices to enable consistent delivery, execution, and evolution of cybersecurity services across our portfolio of Defense and Civilian agency customers. Learn more: https://criterion-sys.com/centers-of-excellence#cybersecurity/
Cybersecurity Operations Maturity Model (COMM) – Criterion’s COMM provides a structured manner to manage and enhance the efficiency and effectiveness of organizational and enterprise CS&P programs and operations. Work starts with a Cyber Operations Review (COR), powered by CyberScale®, Criterion’s U.S. patented compliance and risk management tool. Learn more: https://criterion-sys.com/cyber-operations-maturity-model/
Dedicated Cyber Recruiting Team – Specializing in identifying, recruiting, and retaining the best and brightest cybersecurity professionals, our dedicated recruiting team enables Criterion to provide cleared and certified staff across the life of our cyber contracts. See our open positions.
Provides services and capabilities including engineering, implementation, operation, and maintenance support for information system security controls that are implemented through technical mechanisms in system hardware or software.
Provides services and capabilities including development, implementation, assessment, improvement, maintenance, and governance support for all cross-cutting aspects of the organizational cybersecurity program.
Provides services and capabilities including implementation, operation, and maintenance support for information system security controls executed primarily by people.
Provides services and capabilities including development, implementation, assessment, improvement, and maintenance support for cybersecurity program and system compliance activities, assessment and management of system and organizational level cybersecurity risk, and ongoing conduct of system and organizational continuous monitoring activities.
Here are our latest blog posts on cybersecurity-related topics written by Criterion subject matter experts.
By conducting regular tabletop exercises organizations can identify and address potential gaps in their incident response plans, ensuring that their procedures are effective and robust.
With advancements in quantum computing, industry experts are sounding the alarm that encryption algorithms may become breakable.
Cyber hygiene is a set of practices organizations and individuals perform regularly to maintain the health and security of users, devices, networks, and data.