Cyber Security

We preserve our clients’ visibility within their environments and a security posture commensurate with their mission their environments.

  • Obtain real-time inventory of assets, authorized users, and expected behaviors.
  • Leverage existing, and incorporating new, client cyber security tools and practices to establish a secure baseline for their environment.
  • Use a comprehensive approach for combining people, technical controls, business polices/procedures, and enforcement.
  • Work with the client to understand all accessible aspects of the organization, including its culture and technical environment, to determine the best approach for each situation.
  • Provide the client with sustainable and repeatable security measures for their enterprise.
  • DGS provides cyber security education and training for our clients that is relevant at each level of our clients’ organizations.

  • Integrate training and education within our normal course of interaction with clients.
  • Listen to users to maintain an understanding of security awareness gaps.
  • Maintain awareness of new/emerging threat vectors and update our training materials accordingly.

    Security Tools

    • Firewalls, both network and host based
    • Network and Host Intrusion Detection/Prevention Systems
    • Vulnerability scanning engines and applications
    • Anti-virus solutions
    • Web Content Filters
    • Access Control Systems
    • Log collection and correlation tools (ArcSight, Splunk)
    • Network packet capture and analysis


    Security Practices

    • Incident Response
    • Security Operations
    • Security Operations Management
    • Incident Handling and Response
    • Forensic Analysis (e.g. Reverse Engineering Malware, Anomalous Traffic Analysis)
    • Security Engineering
    • Insider Threat Analysis
    • Cyber Risk Management
    • Cyber Vulnerability Management
    • Governance, Risk, and Compliance (GRC)