Welcome to i2IS
CYBER INGENUITY™ is an end-to-end security design and implementation solution.
CYBER OpSentry™ is the i2IS dual-track capability for improving cybersecurity posture and actively defending against advanced cyberspace threats. Cybersecurity with i2IS is a dynamic, vigilant, operational – 24/7 capability. We conduct our dual-track method in two categories: Active defense and security controls. Features of both include:
CYBER OpSentry™ can be installed on-site with security services conducted internally or through managed service support from i2IS; or, i2IS can provide comprehensive remote managed security services from the i2IS Network Operations Center (NOC). The Active Defense track ensures that malicious activity is identified at the network internet access point (ingress/egress), and enables network administrators to remediate threats immediately. The Security Controls track uses industry best practices to ensure proper configuration management, vulnerability assessment and penetration testing so that a security baseline is established – and in the event of a compromise, restored.
The best technological security solutions can be quickly and easily defeated by network users – and the current threats from cyberspace regularly use social engineering techniques to trick users into errors that enable unauthorized access to your organization network. i2IS addresses this vulnerability through expert training – training designed to modify human behavior.
Users commonly use the Internet – surfing, emailing, tweeting, texting and downloading. Awareness of threats among users is woefully deficient. Many vendors provide “awareness training”. Few, however, modify behavior in ways that align with the security plans of IT managers, compliance directors, or the security strategy of executive leadership.
CYBER CITIZENSHIP™ is designed to instill user ‘ownership’ for their online behavior. Its purpose is to add a training control to one of the many risks emerging from cyberspace.
i2IS leverages the industry-acclaimed training methodology of Imprimis, Inc. (i2). i2 led the course development for the establishment of the US Army Ground-Based Mid-Course Defense Training and Education Center (GTEC). The GTEC, with Imprimis functioning as project manager and lead trainer for the past ten years, received the Training Center of Excellence Accreditation through the US Army in 2005 and revalidated in 2008. This world class approach to training includes Instructional System Design (ISD) methodology and Interactive Media Instruction (IMI), initiated through a training baseline and proceeding with a series of managed spiral upgrades. Additional methodology information can be found at http://www.imprimis-inc.com/i2WebSite/Capability/index.php.
Assessing risk is an on-going process. Certain compliance regimes require a written security plan. While a good first step, the i2IS methodology incorporates a strategic framework to ensure all components are integrated into a comprehensive cybersecurity posture. Training, metrics, compliance and oversight, enforcement, and incident response must be incorporated in a governance structure to enable an organization to implement, execute, monitor and improve its overall cybersecurity defense capabilities.
i2IS also leverages its cross-disciplinary approach, especially law, privacy and compliance expertise, to ensure customers implement a governance strategy that addresses all applicable risk mitigation considerations.
At i2IS, the team’s executive-level, functional and programmatic, government, and industry background enables informed thinking and creativity that helps organizations in multiple ways: alternative risk mitigation strategies, cybersecurity insurance, strategic cybersecurity business development, incident response, culture change agent, public-private partnerships, information sharing frameworks, and “Reasonable Security” advising. In short, we can help you understand cybersecurity risks and opportunities, and the gamut of cybersecurity issue areas (scientific, societal, privacy, governmental and private sector).
The end-to-end security design and implementation solution is offered through our consulting services.
We developed CYBER INGENUITY™ because the single-discipline approach does not adequately address the asymmetric nature of cybersecurity.
For additional information, please contact firstname.lastname@example.org.
For the second time since Aug. 2013, online retailer NoMoreRack.com has hired a computer forensics team after being notified by Discover about a potential breach of customer card data, KrebsOnSecurity has learned.
Adobe and Microsoft today each released software updates to fix serious security flaws in their products. Adobe pushed an update that plugs a pair of holes in its Flash Player software. Microsoft's patch batch includes five updates, including one that addresses a zero-day vulnerability in Internet Explorer that attackers have been exploiting of late.
In February, this blog and its author were recognized for three separate awards. At the RSA Security conference in San Francisco, KrebsOnSecurity.com was voted the “Most Educational Security Blog” at the Security Bloggers Meetup (for the second year in a row). The judges at the meetup also gave KrebsOnSecurity.com the honor of the “Best Blog […]
In October 2013, KrebsOnSecurity published an exclusive story detailing how a Vietnamese man running an online identity theft service bought personal and financial records on Americans directly from a company owned by Experian, one of the three major U.S. credit bureaus. Today's story looks deeper at the damage wrought in this colossal misstep by one of the nation's largest data brokers.
Nationwide beauty products chain Sally Beauty appears to be the latest victim of a breach targeting their payment card systems in stores, according to both sources in the banking industry and new raw data from underground cybercrime shops that traffic in stolen credit and debit cards.
i2 Information Security Corp © 2014
i2IS is a service-disabled veteran-owned small business