Click here to download “Coop in DoD – Part 01 of 10” now! This paper, the first in a ten-part series, analyzes how a full Continuity of Operations (COOP) program can be implemented for a small, non-mission-critical Army program operating …

COOP in DoD – Part #1 of 10 – Define the Landscape Read more »

Tagged with: , , ,

Click here to download “IA Fusion for a DoD Contractor” now! This is a 2011 paper presented to FITSI.org and addresses an ambitious topic for me to cover: “IA Fusion”. My approach explores how DoD and Federal Government contractors can …

“IA Fusion”: Cut costs / improve quality / compete better Read more »

Tagged with: , , ,

Click here to download “Risk Management Methodologies” now! Companies thrive based on the results of their business decisions: from headliners (invest in cloud computing or upgrade servers?); to managerial (add resources to an executing project?); to operational (is it time to …

Whitepaper 03-03: Three Risk Management Methodologies Read more »

Tagged with: , ,

Click here to download “P2SP for DoD Contractors” now! Effective and relevant organizational policies, practices, standards and procedures (P2SP) provide the direction and guidance necessary for vendors to work successfully with the Department of Defense (DoD). Successful implementation of P2SP creates a …

Whitepaper 03-02: IT Policies and Procedures for DoD Read more »

Tagged with: , ,

Click here to download “Awareness and Ethics in the Operations Environment” now! Working in the Department of Defense (DoD) demands providing excellent results, utilizing strong security measures, delivered in a cost-effective way. The DoD has high standards for industry and the …

Whitepaper 03-01: Awareness and Ethics in the Operations Environment Read more »

Tagged with: , ,

Click here to download “Critical Analysis Organizational Network” now! Government is demanding that private industry improve delivery efficiency while simultaneously decreasing costs – all the while meeting ever-more-stringent information assurance requirements. To achieve these goals, organizations of all sizes must …

Whitepaper 02-04: Critical Analysis of an Organization Network Read more »

Tagged with: , ,

Download the whitepaper “Network Perimeter Security” here! Most small companies struggle with network security, but that does not relieve these companies of the requirements for ensuring the confidentiality, integrity, and availability of their network and network resources. This whitepaper helps …

Whitepaper 02-03: Network Perimeter Security Read more »

Tagged with: , ,

Download the Network IAA Use Case whitepaper here! The typical Small / Medium size Business (SMB) must provide both intranet (internal) and extranet (external) access for its employees and customers based on roles, permissions, and clearance. This white paper looks …

Whitepaper 02-02: Network Identification, Authentication, and Authorization Use Case Read more »

Tagged with: , ,