Cyber Security & Information Operations
Over 20 Years Protecting the Systems of Those Who Protect
Watershed Security has been providing solid technical solutions to the Federal Marketplace for over 20 Years. We have engaged on the front lines with our Nation’s warfighters to secure our critical infrastructure from increasing globalized threats. We pool the resources, research, engineering expertise, and experience gleaned from industry best practices and quality assurance to bring you the expert advice, solutions and results that keep you ahead of threats through the use of advanced technology.
Cyber Security and Information Operations
Watershed Security employs a comprehensive Cyber Security / Information Assurance (IA) program to ensure the success of our research and development customers. Watershed partners with our clients to conduct a full and comprehensive assessment of their network for all known vulnerabilities, risks, threats, and provides a detailed report on the security posture of their computing environments. Watershed’s established best practices include risk mitigation strategies that provide CIOs, CISOs and AOs the critical information needed to protect their agency’s data.
Our scalable mitigation process includes integration of best-of-breed solutions, automation, and optimization of security enhancements. We offer ongoing cyber security management to best suit the customer’s requirements. Our team of Cyber Security professionals, with their industry expertise and certifications, develop policies and procedures to provide compliance with regulatory requirements throughout the enterprise.
Watershed Security has the expertise to safeguard our Nation’s critical infrastructure, including experience with Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS). As a service provider, we couple our industry professionals with leading-edge Open Source and COTS products to enable our customers mission.
This should be hidden
Watershed’s consultants provide the essential expertise to properly execute the RMF Authorize step to enable organizations to determination the risk in Cloud systems, on premise systems, military weapons and navigation systems as well as Building Control Systems (BCS). Our engineering assess the risk and provide actionable data to determine to authorize (or not) a system to operate.
We determine the security and privacy posture of that system, as well as the risk from the operation and use of the system. This risk is determined using the authorizing official review and analysis of the information and materials in the authorization package, as well as organizational-level and system-level risk information provided by senior officials (e.g., senior agency information security officer, senior agency official for privacy, risk executive), control assessors, system owners, and other stakeholders to the authorizing official.
If necessary, further discussions between the authorizing official and those furnishing the information may take place to help the authorizing official fully understand the risks. During risk analysis and determination, the authorizing official also takes into consideration organizational risk tolerance, dependencies among systems and controls, mission and business requirements, criticality of the mission or business functions supported by the system, and the overall risk management strategy of the organization.
Authorization and Assessment
We determine the security and privacy posture of that system, as well as the risk from the operation and use of the system. This risk is determined using the authorizing official review and analysis of the information and materials in the authorization package, as well as organizational-level and system-level risk information provided by senior officials (e.g., senior agency information security officer, senior agency official for privacy, risk executive), control assessors, system owners, and other stakeholders to the authorizing official.
If necessary, further discussions between the authorizing official and those furnishing the information may take place to help the authorizing official fully understand the risks. During risk analysis and determination, the authorizing official also takes into consideration organizational risk tolerance, dependencies among systems and controls, mission and business requirements, criticality of the mission or business functions supported by the system, and the overall risk management strategy of the organization.
Vulnerability Management
Engineering / Operations
Policy & Compliance
For federal institutions, Watershed Security provides services to maintain continuous compliance with the National Defense Strategy (NDS), DOD Data Strategy, National Cybersecurity Strategy and other Federal, DoD and US Government governance requirements.