Welcome to i2IS
CYBER INGENUITY™ is an end-to-end security design and implementation solution.
CYBER OpSentry™ is the i2IS dual-track capability for improving cybersecurity posture and actively defending against advanced cyberspace threats. Cybersecurity with i2IS is a dynamic, vigilant, operational – 24/7 capability. We conduct our dual-track method in two categories: Active defense and security controls. Features of both include:
CYBER OpSentry™ can be installed on-site with security services conducted internally or through managed service support from i2IS; or, i2IS can provide comprehensive remote managed security services from the i2IS Network Operations Center (NOC). The Active Defense track ensures that malicious activity is identified at the network internet access point (ingress/egress), and enables network administrators to remediate threats immediately. The Security Controls track uses industry best practices to ensure proper configuration management, vulnerability assessment and penetration testing so that a security baseline is established – and in the event of a compromise, restored.
The best technological security solutions can be quickly and easily defeated by network users – and the current threats from cyberspace regularly use social engineering techniques to trick users into errors that enable unauthorized access to your organization network. i2IS addresses this vulnerability through expert training – training designed to modify human behavior.
Users commonly use the Internet – surfing, emailing, tweeting, texting and downloading. Awareness of threats among users is woefully deficient. Many vendors provide “awareness training”. Few, however, modify behavior in ways that align with the security plans of IT managers, compliance directors, or the security strategy of executive leadership.
CYBER CITIZENSHIP™ is designed to instill user ‘ownership’ for their online behavior. Its purpose is to add a training control to one of the many risks emerging from cyberspace.
i2IS leverages the industry-acclaimed training methodology of Imprimis, Inc. (i2). i2 led the course development for the establishment of the US Army Ground-Based Mid-Course Defense Training and Education Center (GTEC). The GTEC, with Imprimis functioning as project manager and lead trainer for the past ten years, received the Training Center of Excellence Accreditation through the US Army in 2005 and revalidated in 2008. This world class approach to training includes Instructional System Design (ISD) methodology and Interactive Media Instruction (IMI), initiated through a training baseline and proceeding with a series of managed spiral upgrades. Additional methodology information can be found at http://www.imprimis-inc.com/i2WebSite/Capability/index.php.
Assessing risk is an on-going process. Certain compliance regimes require a written security plan. While a good first step, the i2IS methodology incorporates a strategic framework to ensure all components are integrated into a comprehensive cybersecurity posture. Training, metrics, compliance and oversight, enforcement, and incident response must be incorporated in a governance structure to enable an organization to implement, execute, monitor and improve its overall cybersecurity defense capabilities.
i2IS also leverages its cross-disciplinary approach, especially law, privacy and compliance expertise, to ensure customers implement a governance strategy that addresses all applicable risk mitigation considerations.
At i2IS, the team’s executive-level, functional and programmatic, government, and industry background enables informed thinking and creativity that helps organizations in multiple ways: alternative risk mitigation strategies, cybersecurity insurance, strategic cybersecurity business development, incident response, culture change agent, public-private partnerships, information sharing frameworks, and “Reasonable Security” advising. In short, we can help you understand cybersecurity risks and opportunities, and the gamut of cybersecurity issue areas (scientific, societal, privacy, governmental and private sector).
The end-to-end security design and implementation solution is offered through our consulting services.
We developed CYBER INGENUITY™ because the single-discipline approach does not adequately address the asymmetric nature of cybersecurity.
For additional information, please contact firstname.lastname@example.org.
Nationwide arts and crafts chain Michaels Stores Inc. said today that two separate, eight-month-long security breaches at its stores last year may have exposed as many as 3 million customer credit and debit cards.
Oracle has pushed a critical patch update for its Java SE platform that fixes at least 37 security vulnerabilities in the widely-installed program. Several of these flaws are so severe that they are likely to be exploited by malware or attackers in the days or weeks ahead. So -- if you have Java installed -- it is time to update (or to ditch the program once and for all).
Computer hard drive maker LaCie has acknowledged that a hacker break-in at its online store exposed credit card numbers and contact information on customers for the better part of the past year. The disclosure comes almost a month after the breach was first disclosed by KrebsOnSecurity.
Many companies believe that if they protect their intellectual property and customers' information, they've done a decent job of safeguarding their crown jewels from attackers. But in an increasingly common scheme, cybercriminals are targeting the Human Resources departments at compromised organizations and rapidly filing fraudulent federal tax returns on all employees.
In the wake of widespread media coverage of the Internet security debacle known as the Heartbleed bug, many readers are understandably anxious to know what they can do to protect themselves. Here's a short primer.
i2 Information Security Corp © 2014
i2IS is a service-disabled veteran-owned small business