老澳门开奖直播

Cyber Test & Evaluation


Today’s cyber-contested environment demands cradle to grave testing and evaluation for military systems. Doing so helps to discover and remediate vulnerabilities during development – saving time and money later in the lifecycle of the technology. It also maintains that technology’s resiliency to the inevitable cyberattack throughout its operational lifetime.

At 老澳门开奖直播, we have proven tools, processes, and expertise to test and evaluate military systems against the ever-evolving cyber threats. Moreover, we have over a decade of experience through our support of the United States’ Test Resource Management Center’s National Cyber Range (NCR). The range gives government organizations insights into how well their existing information technologies can meet the demands of a rapidly evolving cybersecurity landscape. Because the NCR is secure and can be scaled in size, users can answer their critical cyber questions quickly, accurately, and safely at a fraction of the cost when compared to building and operating a similar privately-owned capability.

Available evaluations for cyber and mission impact

Acquisition Program Testing

Acquisition Program Testing

System of System Testing

System of System Testing

Hardware in the Loop

Hardware in the Loop

Reliable Mission Effectiveness Data

Reliable Mission Effectiveness Data

Cyber Table Tops

Cyber Table Tops

Proven Experience

Using Cyber Table Tops

We’re constantly generating new processes and procedures that programs and government agencies can use to test and evaluate the cybersecurity of the technology. One prime example is the Cyber Table Top (CTT) process. In collaboration with TRMC, we developed the process that applies war-gaming to identify high risk cyber threats to systems. These CTTs consider electronic warfare, supply chains, and other factors beyond cyber, and often focus on the interplay between these domains. The CTT process has been published in an ITEA Journal and adopted as a NAVAIR best practice, and by the Office of the Secretary of Defense DT&E as a key cyber resilience assessment tool.
Built in, Not Bolted on
Latest News   ___
Sep 27, 2024
Story
At 老澳门开奖直播, supply chain security is a top priority, always at the front of our operational mindset to maintain industry excellence.
Sep 27, 2024
Story
On August 15, 2024, DOD published proposed revisions to the Defense Federal Acquisition Regulation Supplement (DFARS) rule for CMMC 2.0
Feb 19, 2024
Story
The DIB Sector Coordinating Council is implementing a new common and simplified assessment model for evaluating supplier cyber posture (CCRA).
Contacts   ___