WE EXCEL IN CYBER SECURITY, NETWORK IMPLEMENTATION, SUPPLY CHAIN MANAGEMENT, and PROJECT MANAGEMENT

SERVICE OFFERINGS

Information Assurance

National Institute of Stadards and Technology
Our consultants implement security policy and procedures that protect information systems, computer systems and networks. We work to maintain confidentiality, integrity, availability, authentication, and nonrepudiation in line with applicable laws, directives, Executive Orders, policies, national standards, or regulations.
Cybersecurity Assessments

cybersecurity assessments Our consultants conduct Security Control Assessments (SCAs) on your information system, computer system, and network. An SCA will test and evaluate the management, operational, and technical security controls in an information system to determine the extent to which the controls are implemented correctly based on the National Institute of Standards and Technology (NIST) and industry best practices. Innovation Leaders, LLC will help determine if the controls are operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system.
Penetration Testing

Penetration Testing Our consultants will conduct penetration testing with your written consent and on agreed terms to strengthen your security posture against malicious hackers, threats to data , personally identifiable information (PII), and privacy. Short phrased as “pen test,“ we will perform a simulated cyber attack against your computer system to check for exploitable vulnerabilities and identify security gaps.
Risk Management Framework Implementation
Risk Management Framework Implementation Our consultants will implement the NIST Risk Management Framework (RMF) which is a risk-based approach that integrates security and risk management activities into the system development lifecycle. RMF is a risk-based approach to security control selection and specification that considers effectiveness, efficiency, and constraints due to applicable laws, directives, Executive Orders, policies, standards, or regulations. Within the RMF implementation we will work to ensure that NIST Special Publication 800-series is incorporated in each step tailored to your effort, project and organizational goals. We also support assessment and authorization (A&A)/ certification and accreditation (C&A) to ensure your systems get a full Authority to Operate from the Authorizing Official (AO).
Information System Security Documentation
IT Security Documentation Our consultants will work with your stakeholders to identify your organizational requirements and assist and develop information security documentation. The examples of information system security documentation that might be required by your organization include but not limited to the following:
  • Information System Contingency Plans (ISCPs)
  • System Security Plans (SSPs)
  • Notification of Change (NOC)
  • Planned Change Comparafive Analysis (PCCAs)
  • Privacy Impact Assessments
  • Security Categorization Forms
  • e-Authentication Risk Assessments
  • Security Assessment Results Briefings for executive-level audiences
  • Authorization Boundary
Supply Chain Management

Supply Chain Management Our consultants will help you identify hardware, software and other needed supplies to ensure your organization is reaching optimal performance. We support the armed services, state, local, federal and tribal governments.