SlideShare a Scribd company logo
 Northrop Grumman
 Cover My Meds
 Internal Revenue Service
 Stealth Entry, LLC
 C2 Labs, LLC
 Valiant Solutions, LLC
COMPANY OVERVIEW
Security 360, LLC is headquartered in Gambrills, Maryland and is a certified Veteran Owned Small Business
(VOSB). Security 360, LLC is a veteran-owned small business backed by more than 25 years of experience in
federal and state government IT and security. We are using this knowledge to make holistic IT services more
readily available for your business as well.
We bring to bear relevant experience in Government, Healthcare, and Financial Services Industries, and many
of our consultants hold or have held Public Trust and Department of Defense (DOD) Security Clearances that
range from Secret to Top Secret SCI.
CYBER SECURITY SOLUTIONS COMPANY DATA
 PENETRATION TESTING
 VULNERABILITY ASSESSMENTS
 APPLICATION SECURITY MGMT
 INCIDENT RESPONSE
 SECURE NETWORK ARCHITECTURE
 SECURE APPLICATION DEVELOPMENT
 SYSTEM/APPLICATION HARDENING
 SECURE CODING GUIDANCE
 DUNS NUMBER: 07-841-2316
 EIN: 45-4643395
 CAGE CODE: 70D08
 NAICS: 541511, 541512, 541519, 541690
 SAMS REGISTERED
 COMPANY CERTIFICATIONS: VOSB, SMALL
BUSINESS
 DoD 8570 QUALIFIED ENGINEERS
 BUY MARYLAND CYBER LISTING:
http://www.mdcyber.com/listings/security-360-llc/
INFORMATION ASSURANCE CONSULTING &
SUPPORT
CONTACT INFORMATION
 CONTINGENCY & BUSINESS CONTINUITY
PLANNING
 GOVERNANCE RISK MANAGEMENT &
 COMPLIANCE (GRC) – FISMA/NIST/ISO
 SECURITY REQUIREMENTS ANALYSIS
 RISK ANALYSIS/RISK PROCESS GUIDANCE
 PRIVACY REQUIREMENTS ANALYSIS
 STAFF MENTORING & GUIDANCE
 INFOSEC TRAINING (CORPORATE/GROUP)
 Randy Bator ,Owner/CEO
Email: rjbator@security360llc.com
Phone: 443.591.9870
Fax: 443.363.0566
LinkedIn: https://www.linkedin.com/pub/randy-
bator/31/a67/84a
Engagements: C2C/SUBK/1099/PRIME
PO Box 441, Gambrills MD 21054
Cyber Security Community Projects and Articles
20 Critical Controls Helper Kit - http://tinyurl.com/ogcxrmk
Security Articles (Via LinkedIn) - https://www.linkedin.com/today/author/113107450

More Related Content

What's hot

ITAR consultant
ITAR consultantITAR consultant
ITAR consultant
LinqsGroup
 
AS 9100 certification
AS 9100 certificationAS 9100 certification
AS 9100 certification
LinqsGroup
 
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
DATUM LLC
 
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
Unified11
 
Hackproof for Healthcare
Hackproof for HealthcareHackproof for Healthcare
Hackproof for Healthcare
hackproof12
 
Provisions in Cyber Insurance Policies - State Bar of Texas Annual Meeting 20...
Provisions in Cyber Insurance Policies - State Bar of Texas Annual Meeting 20...Provisions in Cyber Insurance Policies - State Bar of Texas Annual Meeting 20...
Provisions in Cyber Insurance Policies - State Bar of Texas Annual Meeting 20...
Shawn Tuma
 
M-CAT Enterprises - Corporate Introduction
M-CAT Enterprises - Corporate IntroductionM-CAT Enterprises - Corporate Introduction
M-CAT Enterprises - Corporate Introduction
Anyck Turgeon, CFE/GRCP/CEFI/CCIP/C|CISO/CBA
 
Fisma compliance solutions @ cdg.io
Fisma compliance solutions @ cdg.ioFisma compliance solutions @ cdg.io
Fisma compliance solutions @ cdg.io
CyberGroup
 
ISO consultant
ISO consultantISO consultant
ISO consultant
LinqsGroup
 
Baretzky & Associates Presentation.
Baretzky & Associates Presentation.Baretzky & Associates Presentation.
Baretzky & Associates Presentation.
Ricardo Bn. Baretzky
 
Managing privacy by Victor Chapela
Managing privacy by Victor ChapelaManaging privacy by Victor Chapela
Managing privacy by Victor Chapela
Juan Carlos Carrillo
 
Respond to the following in a minimum of 175 words security req
Respond to the following in a minimum of 175 words security reqRespond to the following in a minimum of 175 words security req
Respond to the following in a minimum of 175 words security req
SHIVA101531
 
Hackproof-Healthcare Supports
Hackproof-Healthcare Supports	Hackproof-Healthcare Supports
Hackproof-Healthcare Supports
hackproof12
 
Magnus Management Group Capability Presentation 2020
Magnus Management Group  Capability Presentation 2020Magnus Management Group  Capability Presentation 2020
Magnus Management Group Capability Presentation 2020
NXTKey Corporation
 
This is the following scenario you are a security professio
This is the following scenario you are a security professioThis is the following scenario you are a security professio
This is the following scenario you are a security professio
raju957290
 
Cyber risk
Cyber riskCyber risk
Cyber risk
Tarek Younan
 

What's hot (18)

Capability Statment
Capability StatmentCapability Statment
Capability Statment
 
ITAR consultant
ITAR consultantITAR consultant
ITAR consultant
 
AS 9100 certification
AS 9100 certificationAS 9100 certification
AS 9100 certification
 
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
 
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
 
Hackproof for Healthcare
Hackproof for HealthcareHackproof for Healthcare
Hackproof for Healthcare
 
Provisions in Cyber Insurance Policies - State Bar of Texas Annual Meeting 20...
Provisions in Cyber Insurance Policies - State Bar of Texas Annual Meeting 20...Provisions in Cyber Insurance Policies - State Bar of Texas Annual Meeting 20...
Provisions in Cyber Insurance Policies - State Bar of Texas Annual Meeting 20...
 
M-CAT Enterprises - Corporate Introduction
M-CAT Enterprises - Corporate IntroductionM-CAT Enterprises - Corporate Introduction
M-CAT Enterprises - Corporate Introduction
 
Fisma compliance solutions @ cdg.io
Fisma compliance solutions @ cdg.ioFisma compliance solutions @ cdg.io
Fisma compliance solutions @ cdg.io
 
Capability Statement
Capability StatementCapability Statement
Capability Statement
 
ISO consultant
ISO consultantISO consultant
ISO consultant
 
Baretzky & Associates Presentation.
Baretzky & Associates Presentation.Baretzky & Associates Presentation.
Baretzky & Associates Presentation.
 
Managing privacy by Victor Chapela
Managing privacy by Victor ChapelaManaging privacy by Victor Chapela
Managing privacy by Victor Chapela
 
Respond to the following in a minimum of 175 words security req
Respond to the following in a minimum of 175 words security reqRespond to the following in a minimum of 175 words security req
Respond to the following in a minimum of 175 words security req
 
Hackproof-Healthcare Supports
Hackproof-Healthcare Supports	Hackproof-Healthcare Supports
Hackproof-Healthcare Supports
 
Magnus Management Group Capability Presentation 2020
Magnus Management Group  Capability Presentation 2020Magnus Management Group  Capability Presentation 2020
Magnus Management Group Capability Presentation 2020
 
This is the following scenario you are a security professio
This is the following scenario you are a security professioThis is the following scenario you are a security professio
This is the following scenario you are a security professio
 
Cyber risk
Cyber riskCyber risk
Cyber risk
 

Viewers also liked

Dex Media Reference Letter
Dex Media Reference LetterDex Media Reference Letter
Dex Media Reference LetterAnthony Brown
 
Aplicación de las tic´s en la educación
Aplicación de las tic´s en la educaciónAplicación de las tic´s en la educación
Aplicación de las tic´s en la educaciónSaezdar
 
Taller5 sino lo conocemos no existe
Taller5 sino lo conocemos no existeTaller5 sino lo conocemos no existe
Taller5 sino lo conocemos no existe
Ixamna
 
Mapa conceptual tecnologia
Mapa conceptual tecnologiaMapa conceptual tecnologia
Mapa conceptual tecnologia
Karla Hernandez
 
Un paso hacia los nuevos paradigmas de la educación
Un paso hacia los nuevos paradigmas de la educaciónUn paso hacia los nuevos paradigmas de la educación
Un paso hacia los nuevos paradigmas de la educaciónJohn Moravec
 
Framework for Channel Attenuation Model Final Paper
Framework for Channel Attenuation Model Final PaperFramework for Channel Attenuation Model Final Paper
Framework for Channel Attenuation Model Final PaperKhade Grant
 
LSettlement_INDEX_Map
LSettlement_INDEX_MapLSettlement_INDEX_Map
LSettlement_INDEX_MapMichael Ball
 
Privacidad internet
Privacidad internetPrivacidad internet
Privacidad internet
Jose Manuel Ortega Candel
 
Surveys report
Surveys reportSurveys report
Surveys report
Hesty Wulandari
 
desideri preziosi
desideri preziosidesideri preziosi
desideri preziosifrancy7
 
CircleUp Overview
CircleUp OverviewCircleUp Overview
CircleUp Overview
John Payne
 
Fashion.net & Live Nation
Fashion.net & Live NationFashion.net & Live Nation
Fashion.net & Live Nationinterdos
 
Sanciones F.Ourensano.
Sanciones F.Ourensano.Sanciones F.Ourensano.
Sanciones F.Ourensano.José Morales
 
Learning from the Best of-the-Best Websites march2011
Learning from the Best of-the-Best Websites march2011Learning from the Best of-the-Best Websites march2011
Learning from the Best of-the-Best Websites march2011
Prescient Digital Media
 
Deepak r gorad brand positioning of lakme
Deepak r  gorad  brand positioning of lakmeDeepak r  gorad  brand positioning of lakme
Deepak r gorad brand positioning of lakme
Deepak R Gorad
 

Viewers also liked (20)

Dex Media Reference Letter
Dex Media Reference LetterDex Media Reference Letter
Dex Media Reference Letter
 
OCCtsingyiportfolio
OCCtsingyiportfolioOCCtsingyiportfolio
OCCtsingyiportfolio
 
Compagnonnage1311
Compagnonnage1311Compagnonnage1311
Compagnonnage1311
 
151202 koeienstoet-in-tirol-2013
151202   koeienstoet-in-tirol-2013151202   koeienstoet-in-tirol-2013
151202 koeienstoet-in-tirol-2013
 
Aplicación de las tic´s en la educación
Aplicación de las tic´s en la educaciónAplicación de las tic´s en la educación
Aplicación de las tic´s en la educación
 
Taller5 sino lo conocemos no existe
Taller5 sino lo conocemos no existeTaller5 sino lo conocemos no existe
Taller5 sino lo conocemos no existe
 
Histoire du col du mont cenis
Histoire du col du mont cenisHistoire du col du mont cenis
Histoire du col du mont cenis
 
Mapa conceptual tecnologia
Mapa conceptual tecnologiaMapa conceptual tecnologia
Mapa conceptual tecnologia
 
Un paso hacia los nuevos paradigmas de la educación
Un paso hacia los nuevos paradigmas de la educaciónUn paso hacia los nuevos paradigmas de la educación
Un paso hacia los nuevos paradigmas de la educación
 
Houses of Parliamentrev02
Houses of Parliamentrev02Houses of Parliamentrev02
Houses of Parliamentrev02
 
Framework for Channel Attenuation Model Final Paper
Framework for Channel Attenuation Model Final PaperFramework for Channel Attenuation Model Final Paper
Framework for Channel Attenuation Model Final Paper
 
LSettlement_INDEX_Map
LSettlement_INDEX_MapLSettlement_INDEX_Map
LSettlement_INDEX_Map
 
Privacidad internet
Privacidad internetPrivacidad internet
Privacidad internet
 
Surveys report
Surveys reportSurveys report
Surveys report
 
desideri preziosi
desideri preziosidesideri preziosi
desideri preziosi
 
CircleUp Overview
CircleUp OverviewCircleUp Overview
CircleUp Overview
 
Fashion.net & Live Nation
Fashion.net & Live NationFashion.net & Live Nation
Fashion.net & Live Nation
 
Sanciones F.Ourensano.
Sanciones F.Ourensano.Sanciones F.Ourensano.
Sanciones F.Ourensano.
 
Learning from the Best of-the-Best Websites march2011
Learning from the Best of-the-Best Websites march2011Learning from the Best of-the-Best Websites march2011
Learning from the Best of-the-Best Websites march2011
 
Deepak r gorad brand positioning of lakme
Deepak r  gorad  brand positioning of lakmeDeepak r  gorad  brand positioning of lakme
Deepak r gorad brand positioning of lakme
 

Similar to Sec_360_Capability_Statement

Security_360_Marketing_Package
Security_360_Marketing_PackageSecurity_360_Marketing_Package
Security_360_Marketing_PackageRandy B.
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourYasser Mohammed
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementWilliam McBorrough
 
Managed IT Services – CRI Advantage
Managed IT Services – CRI AdvantageManaged IT Services – CRI Advantage
Managed IT Services – CRI Advantage
CRI Advantage
 
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
Executive Leaders Network
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
PECB
 
SolarWinds Presents Compliance with Log and Event Manager
SolarWinds Presents Compliance with Log and Event ManagerSolarWinds Presents Compliance with Log and Event Manager
SolarWinds Presents Compliance with Log and Event Manager
SolarWinds
 
Cyber insurance : Fraud, waste or abuse?
Cyber insurance : Fraud, waste or abuse?Cyber insurance : Fraud, waste or abuse?
Cyber insurance : Fraud, waste or abuse?
Priyanka Aash
 
Privacy, Security + Risk: Case Studies + Best Practices for Your Company
Privacy, Security + Risk: Case Studies + Best Practices for Your CompanyPrivacy, Security + Risk: Case Studies + Best Practices for Your Company
Privacy, Security + Risk: Case Studies + Best Practices for Your Company
Kegler Brown Hill + Ritter
 
CISM.pdf
CISM.pdfCISM.pdf
CISM.pdf
tsaaroacademy
 
Pitss
PitssPitss
1.0 introduction v2
1.0 introduction v21.0 introduction v2
1.0 introduction v2
Paradigm Management Group
 
How to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness ProgramHow to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness Program
Matt Moneypenny
 
NIST 800-171 compliance
NIST 800-171 complianceNIST 800-171 compliance
NIST 800-171 compliance
LinqsGroup
 
Cyber Data Breach Review_ A Comprehensive Insight with LDM Global in the USA....
Cyber Data Breach Review_ A Comprehensive Insight with LDM Global in the USA....Cyber Data Breach Review_ A Comprehensive Insight with LDM Global in the USA....
Cyber Data Breach Review_ A Comprehensive Insight with LDM Global in the USA....
LDM Global
 
Cybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalCybersecurity pres 05-19-final
Cybersecurity pres 05-19-final
Vivek Ahuja
 
Developing a 360° view of risk and compliance
Developing a 360° view of risk and complianceDeveloping a 360° view of risk and compliance
Developing a 360° view of risk and compliance
Inuit AB
 
Sa corporate brochure 2014 (1)
Sa corporate brochure 2014 (1)Sa corporate brochure 2014 (1)
Sa corporate brochure 2014 (1)
Security Alliance
 

Similar to Sec_360_Capability_Statement (20)

Security_360_Marketing_Package
Security_360_Marketing_PackageSecurity_360_Marketing_Package
Security_360_Marketing_Package
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
 
Managed IT Services – CRI Advantage
Managed IT Services – CRI AdvantageManaged IT Services – CRI Advantage
Managed IT Services – CRI Advantage
 
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
OneTrust: Securing the Supply Chain: What Does Compliance Look Like?
 
Simple Safe Steps to Cyber Security
Simple Safe Steps to Cyber SecuritySimple Safe Steps to Cyber Security
Simple Safe Steps to Cyber Security
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
 
Sect r35 a
Sect r35 aSect r35 a
Sect r35 a
 
SolarWinds Presents Compliance with Log and Event Manager
SolarWinds Presents Compliance with Log and Event ManagerSolarWinds Presents Compliance with Log and Event Manager
SolarWinds Presents Compliance with Log and Event Manager
 
Cyber insurance : Fraud, waste or abuse?
Cyber insurance : Fraud, waste or abuse?Cyber insurance : Fraud, waste or abuse?
Cyber insurance : Fraud, waste or abuse?
 
Privacy, Security + Risk: Case Studies + Best Practices for Your Company
Privacy, Security + Risk: Case Studies + Best Practices for Your CompanyPrivacy, Security + Risk: Case Studies + Best Practices for Your Company
Privacy, Security + Risk: Case Studies + Best Practices for Your Company
 
CISM.pdf
CISM.pdfCISM.pdf
CISM.pdf
 
Pitss
PitssPitss
Pitss
 
1.0 introduction v2
1.0 introduction v21.0 introduction v2
1.0 introduction v2
 
How to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness ProgramHow to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness Program
 
NIST 800-171 compliance
NIST 800-171 complianceNIST 800-171 compliance
NIST 800-171 compliance
 
Cyber Data Breach Review_ A Comprehensive Insight with LDM Global in the USA....
Cyber Data Breach Review_ A Comprehensive Insight with LDM Global in the USA....Cyber Data Breach Review_ A Comprehensive Insight with LDM Global in the USA....
Cyber Data Breach Review_ A Comprehensive Insight with LDM Global in the USA....
 
Cybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalCybersecurity pres 05-19-final
Cybersecurity pres 05-19-final
 
Developing a 360° view of risk and compliance
Developing a 360° view of risk and complianceDeveloping a 360° view of risk and compliance
Developing a 360° view of risk and compliance
 
Sa corporate brochure 2014 (1)
Sa corporate brochure 2014 (1)Sa corporate brochure 2014 (1)
Sa corporate brochure 2014 (1)
 

Sec_360_Capability_Statement

  • 1.  Northrop Grumman  Cover My Meds  Internal Revenue Service  Stealth Entry, LLC  C2 Labs, LLC  Valiant Solutions, LLC COMPANY OVERVIEW Security 360, LLC is headquartered in Gambrills, Maryland and is a certified Veteran Owned Small Business (VOSB). Security 360, LLC is a veteran-owned small business backed by more than 25 years of experience in federal and state government IT and security. We are using this knowledge to make holistic IT services more readily available for your business as well. We bring to bear relevant experience in Government, Healthcare, and Financial Services Industries, and many of our consultants hold or have held Public Trust and Department of Defense (DOD) Security Clearances that range from Secret to Top Secret SCI. CYBER SECURITY SOLUTIONS COMPANY DATA  PENETRATION TESTING  VULNERABILITY ASSESSMENTS  APPLICATION SECURITY MGMT  INCIDENT RESPONSE  SECURE NETWORK ARCHITECTURE  SECURE APPLICATION DEVELOPMENT  SYSTEM/APPLICATION HARDENING  SECURE CODING GUIDANCE  DUNS NUMBER: 07-841-2316  EIN: 45-4643395  CAGE CODE: 70D08  NAICS: 541511, 541512, 541519, 541690  SAMS REGISTERED  COMPANY CERTIFICATIONS: VOSB, SMALL BUSINESS  DoD 8570 QUALIFIED ENGINEERS  BUY MARYLAND CYBER LISTING: http://www.mdcyber.com/listings/security-360-llc/ INFORMATION ASSURANCE CONSULTING & SUPPORT CONTACT INFORMATION  CONTINGENCY & BUSINESS CONTINUITY PLANNING  GOVERNANCE RISK MANAGEMENT &  COMPLIANCE (GRC) – FISMA/NIST/ISO  SECURITY REQUIREMENTS ANALYSIS  RISK ANALYSIS/RISK PROCESS GUIDANCE  PRIVACY REQUIREMENTS ANALYSIS  STAFF MENTORING & GUIDANCE  INFOSEC TRAINING (CORPORATE/GROUP)  Randy Bator ,Owner/CEO Email: rjbator@security360llc.com Phone: 443.591.9870 Fax: 443.363.0566 LinkedIn: https://www.linkedin.com/pub/randy- bator/31/a67/84a Engagements: C2C/SUBK/1099/PRIME PO Box 441, Gambrills MD 21054 Cyber Security Community Projects and Articles 20 Critical Controls Helper Kit - http://tinyurl.com/ogcxrmk Security Articles (Via LinkedIn) - https://www.linkedin.com/today/author/113107450