Learn the ECS approach to cyber intelligence, why they migrated from legacy government risk and compliance systems to Elastic, and what they learned about enterprise application development and deployment.
See the video: https://www.elastic.co/elasticon/tour/2019/washington-dc/ecs-delivering-better-cyber-intelligence-and-compliance
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
ECS: Delivering Better Cyber Intelligence and Compliance
1. Elastic(on) 2019
Presented by:
§ Joanna Dempsey, Director, Cyber Solutions
§ Mike Zakrzewski, Director, Cyber Technologies
§ James Byroads, Lead Developer
Continuous Monitoring
using Elastic
Continuous Monitoring Objectives, Challenges & Solutions1
Demo – Continuous Monitoring with Elasticsearch & Kibana2
What’s Next?3
2. Fairfax, VA
Headquarters
$642M
2018 Revenue
2400+ Employees
Nationally and Internationally
Top Workplace
by Washington Post Since 2014
ECS OVERVIEW
ECS is a leading information technology provider delivering solutions in cloud,
cybersecurity, software development, IT modernization, and science and engineering.
The company's highly skilled teams approach and solve critical, complex challenges for
customers across the U.S. public sector, defense, and commercial industries. ECS
maintains partnerships with leading cloud and cybersecurity technology providers and
holds specialized certifications in their technologies.
Our Expertise
— Cloud Solutions
— Cybersecurity
— Software & Systems
— IT Modernization
— Science & Engineering
Our Customers
— Federal Civilian
— Department of Defense
— Intel and Homeland Security
— State, Local, and Education
— Commercial
Our Technology Partners
— Microsoft
— Amazon Web Services (AWS)
— McAfee
— Elastic
— Google
3. 3
ECS CYBERSECURITY SERVICES
Our mission to simplify and
strengthen your cybersecurity
drives our range of solution
delivery options—from ongoing
managed security services
and operating your Virtual
SOC to short-term professional
service engagements.
Virtual SOC
Active Defense &
Hunting
Penetration Testing
Threat Detection
Service
Breach Detection
Service
Incident Response
Governance, Risk, &
Compliance
Vulnerability
Management
5. 5
CONTINUOUS MONITORING
The Objective of Continuous Monitoring is to enhance your IT
security posture, by promoting ongoing awareness of information
security, vulnerabilities, and threats to support organizational risk
management decisions
Challenges include visibility, prioritization and balancing flexibility
and standardization to drive enterprise-wide value
ECS seeks solutions that promote scalability, interoperability and
flexibility, while considering total cost of ownership