Cybersecurity has moved from the back room to Congress, and from trade journals to mainstream news. In the public sector — Civilian, Defense, Intelligence Community, state government and education — CIOs must now put cybersecurity at the top of their priority list. Budgets are as tight as ever, so they must maximize the value of each expenditure, while complying with a maze regulations, laws, and frameworks.

DLT Solutions understands these challenges, and the speed of change in technology making them harder every day. DLT Solutions sees security as foundations + innovation: a strong security and IT infrastructure lays the groundwork for leveraging innovative technologies that can outrun the bad actors. Our client offerings can strengthen your current security posture, and look ahead to new solutions that make our adversaries scramble to keep pace.

Our Approach

Small chart of DLT's Cybersecurity Framework
cybersecurity-framework-overview

DLT Solutions understands the complexity of cybersecurity, which affects nearly every aspect of technology. To simplify matters, we boil down cyber into 13 categories; here’s the breakdown.

Application Security
To protect applications, write them securely. DLT Solutions' line includes tools and services to assist in secure application development at all phases of the development life cycle.

Even the most secure applications still need protection after deployment, so DLT Solutions also has a wealth of external systems and software to protect applications in production.

Configuration Management
Consistent device and application configuration is essential for strong security. This task is becoming increasingly difficult as users bring more devices to the network, applications and systems move to the cloud, and IOT devices proliferate.
DLT Solutions provides the tools you need to ensure consistent and up-to-date configuration of all types of devices and systems in your network.

Contingency Planning, Redundancy, & Business Continuity
Most organizations accept that bad actors will eventually compromise their network or critical systems. Consequently, it is essential to deploy tools for that:

  • provide, system and data redundancy
  • monitor and prevent denial-of-service DoS or DDoS) attacks,
  • and ensure that you can operate even while recovering from a breach.

DLT Solutions' clients offer robust capabilities to help you recover, and get back to the mission ASAP.

Data Security
Ultimately, security is all about protecting data. Data security includes data encryption, monitoring data flows, detecting and preventing unauthorized changes, to all data -- at rest, in motion, or in use. DLT Solutions' robust line of security offerings cover all types of data, in all three scenarios.

Endpoint Protection
In the past, endpoint protection systems were virus detection programs that used signatures to identify malicious files. As attacks grew in sophistication, endpoint protection had to keep pace, to detect and neutralize "zero day" (brand new) attacks, and even to deal with attacks that don’t use files at all. DLT Solutions stays current with these trends, and our line of endpoint protection products offers state-of-the-art protection.

Governance, Risk, and Compliance
Government security programs spend much of their budget on compliance with laws, regulations, and policies. Too often, compliance does not equate to security. Consequently, DLT Solutions provides a line of products to automate or facilitate compliance. We also map our product line to specific compliance regimes, such as NIST 800-53 and the Cybersecurity Framework.

Identity and Access Management (IAM)This is the art and science of ensuring that a user is who they say they are, ensuring that they have the right level of access to data, and that access is both convenient and secure.
DLT’s IAM offerings include:

  • management and provisioning of user IDs and credentials
  • privileged access management
  • single sign-on,(SSO),
  • and management of tools such as hardware and software tokens

Incident Response and Forensics (IR)
DLT’s IR systems respond to breaches automatically and enable security staff to react effectively to intrusions. Response capabilities include gathering and analysis of evidence for attribution, remediation of compromised systems, and automated incident reporting.

Infrastructure Security
Infrastructure Security includes almost any type of device or system that protects an organization’s infrastructure. The list includes devices such as:

  • firewalls and next-generation firewalls
  • electronic mail gateways
  • network access control (NAC) systems
  • intrusion detection/prevention systems (IDS/IPS)
  • Web Application Firewalls (WAFS)
  • and host-based intrusion detection systems (HIDS)
    and technologies such as:
  • DDoS Monitoring and mitigation
  • Software-defined Perimeter
  • DNS Protection

DLT partners with clients who provide state-of-the-art systems and software in all of these areas.

Messaging Security
Phishing — deceptive e-mail that lures a victim into installing malware on their system — remains the most common mode of attack. Security of messaging systems in general and e-mail systems in particular is extremely important. These systems can block advanced threats and suspected malware to a sandbox for analysis, detonation, and risk scoring. They can also analyze file attachments and URLs, and act appropriately to ensure these threats cause no harm.

DLT Solutions has a wide range of messaging security solutions to guard against intrusions via messaging and e-mail systems.

System and Asset Management
It is impossible to secure unidentified assets. DLT Solutions' system and asset management products establish a baseline inventory essential for nearly any further security activities, and can ensure that all devices are secure.

Text reads: CyberEdge Episodes

 

Speed, agility, and a new understanding of organizational values are the keys to navigating the next normal. The most effective leaders have a mental model and need to operate simultaneously across three horizons: navigating the crisis now, planning for the recovery, and leading the next normal.

Below you will find episode recordings from ICIT Briefing 2020 to learn from national leaders how to navigate the now, how to plan for the future, and how to lead their organization through the next decade.

 
White text on blue background. Text reads: Subscribe now to CyberEdge Episodes

Episode List

 

CyberEdge Episode 1: with Oki Mek

CyberEdge Episode 1: Leading through Crises: Communication, Collaboration, Coordination – November 11, 2020. Length: 29.55
The unprecedented worldwide crisis spawned by the recent and continuing healthcare challenges makes leading more challenging than ever. Executives face the stress and consequences of a pandemic on top of the tumult of an unsettled marketplace and civil unrest. The concepts and tools of meta-leadership help those leaders reframe adversity. The secrets to success are communication, coordination, and collaboration. It is an opportunity for building enduring transformational change. These leaders will share their challenges, successes, and opportunities for improvement as we continue to wade through uncertain waters.

Speakers:

  • Oki Mek Senior Advisor to the HHS CIO | HHS ReImagine
  • Joyce Hunter, Exec.Director, ICIT & Former Deputy CIO for Policy & Planning, USDA

 

CyberEdge Episode 2 with Scott Breor

CyberEdge Episode 2: Leading through Crises: Communication, Collaboration, Coordination – November 11, 2020. Length: 29:53
The unprecedented worldwide crisis spawned by the recent and continuing healthcare challenges makes leading more challenging than ever. Executives face the stress and consequences of a pandemic on top of the tumult of an unsettled marketplace and civil unrest. The concepts and tools of meta-leadership help those leaders reframe adversity. The secrets to success are communication, coordination, and collaboration. It is an opportunity for building enduring transformational change. These leaders will share their challenges, successes, and opportunities for improvement as we continue to wade through uncertain waters.

Speakers:

  • Scott Breor, Deputy Assistant Director, Infrastructure Security, Cybersecurity and Infrastructure Security Agency (CISA)
  • Joyce Hunter, Exec.Director, ICIT & Former Deputy CIO for Policy & Planning, USDA

 

CyberEdge Episode 3 Crisis Management with BitSight

CyberEdge Episode 3: Fireside Chat: Crisis Management Retrospective – November 11, 2020. Length: 48:52
Crises and disasters are regular occurrences in organizational life, putting leaders into the spotlight and organizations under tremendous pressure to respond appropriately — whether it is to preserve life or salvage reputations. Hearing how three of our public leaders responsible for communications and connectivity, ensuring small business security and sustainability, and developing metrics-driven performance measures for NASA will discuss some important texts on organizational crises and their management style.

Speakers:

  • Francisco Salguero, CIO, Federal Communications Commission (FCC)
  • James Saunders, CISO, Small Business Administration
  • Renee Wynn, Former CIO, NASA
  • Jacob Olcott, VP, Government Affairs & Communications, BitSight
  • Mr. Louis Dorsey, Sr. Director for Civilian Market Intelligence, DLT Solutions

 

 

CyberEdge Episode 4: Jam Board Workshop

CyberEdge Episode 4: RECOVER, PLAN, PREPARE - "Jam" Board Workshops — Secure Your Roadmap – November 11, 2020. Length: 1:00:25
​The point of developing a crisis management plan is to think through any difficult decisions and map out, to the best of your ability, the necessary tasks, communication and information that will help make managing a crisis easier and more efficient. In this episode, we will be using an electronic whiteboard to facilitate collaborative brainstorming, idea sharing, and creativity in developing a notional plan for future crises. Facilitators covered all the topics – recover, plan, or prepare to create, and post sticky notes during this episode.

Speakers:

  • Joyce Hunter, Exec.Director, ICIT & Former Deputy CIO for Policy & Planning, USDA
  • Stevie Hamilton, Dir, Interagency & International Coordination Cell in the Global Engag. Center, Department of State
  • David Meltzer, CTO, Tripwire
  • James Lewis, Solutions Architect, Federal, Trend Micro
  • Patrick Bevill, Chief Information Security Officer, FTRIB
  • Jim Liew, PhD, Associate Professor, Johns Hopkins Carey Business School

 

CyberEdge Episode 5: Jam Board Analysis

CyberEdge Episode 5: RECOVER, PLAN, PREPARE - "Jam" Board Workshops — Secure Your Roadmap — Analysis – November 11, 2020. Length: 32:07
​The key purpose for the analysis is to identify ideas and best practices that can potentially be replicated and will best align an organization’s resources and capabilities to the requirements of the environment. The internal potential and limitations and the probable/likely opportunities and threats from the external environment were identified using the data from the previous session, considering all the positive and negative factors inside and outside the organization that affect the success. This analysis of the environment in which the organization operates will offer suggestions in forecasting/predicting the changing trends and help in including them in the decision-making process.

Speakers:

  • Mr. Don Maclean, Chief Cybersecurity Technologist, DLT Solutions
  • David Meltzer, CTO, Tripwire
  • James Lewis, Solutions Architect, Federal, Trend Micro
  • Jim Liew, PhD, Associate Professor, Johns Hopkins Carey Business School
  • Patrick Bevill, Chief Information Security Officer, FTRIB
  • Joyce Hunter, Exec.Director, ICIT & Former Deputy CIO for Policy & Planning, USDA
  • Drew Spaniel, Lead Researcher, ICIT

 

CyberEdge Episode 6: PREPARE- Fireside Chat with Colonel (ret) Bobby Saxon, Deputy Chief Information Officer, CMS

CyberEdge Episode 6: Fireside Chat with Colonel (ret) Bobby Saxon, Deputy Chief Information Officer, CMS – November 11, 2020. Length: 34:45
The challenge for leaders is to deploy influence, often beyond their formal authority, to foster unity of purpose and effort. The secrets to success are communication, coordination, and collaboration. In this episode, we will hear from a government leader who has recovered from crisis, built resilient frameworks, and helped organizations become more proactive and prepare better for crisis.

Speakers:

  • Colonel (ret.) Bobby Saxon, Deputy CIO, Office of Information Technology Centers for Medicare Medicaid Services (CMS)
  • Scott Sloan, Senior Director of Pre-Sales Engineering, Veritas
  • Joyce Hunter, Exec.Director, ICIT & Former Deputy CIO for Policy & Planning, USDA

 

CyberEdge Episode 7: Epilogue: Building a Holistic Cybersecurity Culture

CyberEdge Episode 7: Epilogue: Building a Holistic Cybersecurity Culture – November 11, 2020. Length: 1:02:55
Despite heightened risks over data breaches, over 40% of organizations do not have a proper cybersecurity strategy. Making cybersecurity the DNA of an organization is not an easy undertaking, but not impossible, right? It might take a lot of effort to identify gaps in the business procedures where hackers could sneak in. Organizations should also ramp up their defense procedures by instilling complete transparency over cybersecurity risks. But first, they should build a holistic approach to cybersecurity, a posture that combines employees, processes, and technologies. This final panel is the Epilogue which will examine holistic approaches to cybersecurity strategy which can be obtained by mixing integrated security methods, impactful employee upskilling/reskilling, robust infrastructure, best risk-analysis programs, effective policies, and building a culture of cybersecurity as a shared responsibility.

Speakers:

  • Joyce Hunter, Exec.Director, ICIT & Former Deputy CIO for Policy & Planning, USDA
  • Janet Vogel, CISO, HHS
  • Jothi Dugar, CISO, NIH
  • Venice Goodwine, CISO, USDA
  • Sherry Bennett, PH.D., Chief Data Scientist, DLT Solutions

 

CyberEdge Episode 8: Fireside Chat – The New Normal

CyberEdge Episode 8: Fireside Chat – The New Normal – November 11, 2020. Length: 37:06
The National Institutes of Health (NIH and more specifically the National Institute of Allergies and Infectious Diseases (NIAID) is at the epicenter of research and early warnings of emerging diseases wherever they occur, which will be critical to rapid responses. The knowledge gained through this research will increase our preparedness for future outbreaks. In this episode, the Chief Information Officer and the Director of the Office of Cyber Infrastructure and Computational Biology for NIAID will share his ideas and recommendations for Digital Collaboration in Technology and Science as part of the "New Normal."

Speakers:

  • Michael Tartakovsky, CIO & Director, Office of Cyber Infrastructure & Computational Biology, National Institutes of Health, Allergy & Infectious Diseases (NIAID)
  • James Carder, CISO/VP LR LABS, LogRhythm, Inc.
  • Joyce Hunter, Exec.Director, ICIT & Former Deputy CIO for Policy & Planning, USDA