Details

Details include key deliverables, the cross-referenced and related enablers.  

E0. Consult-free introduction to TechnologyMilestones

Description: this enabler is a free session to explore the functionality of TechnologyMilestones.

 

Related Enablers (often included):

none

E1. Build-IT Acquisition Strategy

Description: building IT acquisition strategy is the first step to gaining control over your information technology expenditures. Many technologies that have emerged over the past several years, when implemented properly, can save an organization cost, staff, and provide an enhanced level of cybersecurity. Creating an IT acquisition plan includes a careful review of all variables that impact information technology. Listed below are common enablers associated with developing an IT acquisition strategy.

 

Related enablers (often included):
E2. Consult-compute technologies
E4. Build-analytic strategy
E7. Build-infrastructure strategy
E10. Build-virtualization and container strategy
E13. Build-cloud strategy
E15. Build-inventory strategy
E18. Build-network strategy
E21. Build-data strategy
E24. Build-recovery and availability strategy
E50. Implement-technical writing
E51. Implement-technical visualization
E53. Implement-industry interest analysis
E56. Implement-roadmap development based on industry
E59. Build-patch management strategy
E61. Build-online services strategy
E64. Desktop modernization strategy

 

E2. Consult-Compute Technologies

Description: The evolution of the computer continues to enhance performance and enable organizations to maximize their investment in technologies that use compute components. Computer technologies are found in multiple components that exist within our environments, to include servers, storage, network gear, cybersecurity hardware, desktops, laptops, and IoT devices. Technologies found within these components include cores, sockets, RAM, CPU, GPU, and APUs.  The application of computing technology should be focused on the organization's objective. For example, I am interested in purchasing analytics functionality; do I select servers with GPU's? How will my performance be impacted? How does buying different types of technologies increase my functionality and decrease my cost? During this Consulting session, we will discuss a logical approach to evaluating all compute base technologies, enabling your organization to make more informed decisions.

 

Related enablers (often included):
E1. Build-IT acquisition strategy
E4. Build-analytic strategy
E6. Consult-infrastructure strategy
E7. Build-infrastructure strategy
E9. Consult-virtualization and container technologies
E10. Build-virtualization and container strategy
E12. Consult-cloud strategy
E13. Build-cloud strategy
E17. Consult-network strategy
E18. Build-network strategy
E20. Consult-data strategy
E21. Build-data strategy
E47. Consult-aggregators in SIEMS

E3. Consult-Analytics, IoT and AI working together

Description: At the conclusion of the E3 Consulting session, the E4 enabler will assist in the building of the strategy. The world of data Analytics is upon us and will continue. Our ability to process and gain usable information from data collected continues to be a challenge for most organizations. The discussion really starts with the type of data, structured or unstructured, where that data will be processed, and the performance and security of the information collected. Actuators and sensors are adding additional data points that become challenging for many organizations. Does the mechanical pump in the air-conditioning system have a direct impact on customer satisfaction or margin? How does artificial intelligence assist individuals and organizations with the understanding of large sets of data? Embracing a strategy with a clear understanding of many of the impactful variables will allow organizations to enhance their investments. 

 

Related enablers (often included):
E1. Build-IT acquisition strategy
E4. Build-analytic strategy
E6. Consult-infrastructure strategy
E7. Build-infrastructure strategy
E9. Consult-virtualization and container technologies
E10. Build-virtualization and container strategy
E12. Consult-cloud strategy
E13. Build-cloud strategy
E17. Consult-network strategy
E18. Build-network strategy
E20. Consult-data strategy
E21. Build-data strategy
E47. Consult-aggregators in SIEMS

E4. Build-Analytics Strategy

Description: The E4 enabler will assist in the building of strategy in preparation for the implementation of the strategy found within the E5 enabler. Building an analytic strategy for an organization is vitally important if the organization is looking to maximize the value of data collected within the environment. The strategy includes understanding the organizations infrastructure to include the hardware, software and process to establish the most efficient path and configuration for analytics. The infrastructure and data strategy within the environment will be a critical component of success for analytics, as well as the proper compute resources available to handle the often resource bound analytic services. A close companion to data analytics is the use of artificial intelligence to make decisions based upon specific variables or indicators within the environment. This level of automation, often called rules, provides the organization with consistent output and evaluation for adjustments to the analytic strategy. In analytic strategy cannot be absent of the impact of sensors, often associated with the Internet of things (IOT), and the value of the data collected. IOT actuators are often the recipient of data analytics and artificial intelligence activities. This enabler is designing the architecture and requirements for the implementation of the analytic environment.

 

Related Enablers (often included):

E2. Consult-compute technologies

E3. Consult-analytics, IOT and AI

E5. Implement-analytics strategy

E6. Consult-infrastructure strategy

E7. Build-infrastructure strategy

E8. Implement-infrastructure strategy

E17. Consult-network strategy

E18. Build-network strategy

E20. Consult-data strategy

E21. Build-data strategy

E5. Implement-Analytic Strategy

Description: The E5 enabler will assist in the implementation of the strategy defined by the organization or the E4 enabler. The implementation and fine-tuning of the environment will have a direct impact on cost, performance and viability of the data produced for the organization.

 

Related Enablers (often included):

E1. Build-IT Acquisition Strategy

E2. Consult-Compute Technologies

E3. Consult-Analytics, IoT and AI working together

E4. Build-Analytics Strategy

E5. Implement-Analytic Strategy

E6. Consult-Infrastructure Strategy

E7. Build-Infrastructure Strategy

E8. Implement-Infrastructure Strategy

E17. Consult-Network Strategy

E18. Build-Network Strategy

E20. Consult-Data Strategy

E21. Build-Data Strategy

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E6. Consult-Infrastructure Strategy

Description: At the conclusion of the E6 Consulting session, the E7 enabler will assist in the building of the infrastructure strategy. The infrastructure includes all aspects of the information technology environment to include hardware, software, and process. Infrastructure historically is associated with “local” information technology resources, although must also include the discussion around the integration of cloud, in most cases in a hybrid model between local infrastructure and cloud infrastructure. This Consulting session will provide a brief introduction to many of the core tenants of an infrastructure and answer questions.

 

Related Enablers (often included):

E2. Consult-Compute Technologies

E7. Build-Infrastructure Strategy

E10. Build-Virtualization and Container Strategy

E13. Build-Cloud Strategy

E15. Build-IT Inventory Strategy

E18. Build-Network Strategy

E21. Build-Data Strategy

E24. Build-Recovery/availability Strategy

E7. Build-Infrastructure Strategy

Description: The E7 enabler will assist in the building of the infrastructure strategy to prepare for the implementation in the E8 enabler. The infrastructure includes all aspects of the information technology environment to include hardware, software, and process. Infrastructure historically is associated with “local” information technology resources, although must also include the discussion around the integration of cloud, in most cases in a hybrid model between local infrastructure and cloud infrastructure. This Consulting session will provide a brief introduction to many of the core tenants of an infrastructure and answer questions.

 

Related Enablers (often included):

E2. Consult-Compute Technologies

E6. Consult-Infrastructure Strategy

E10. Build-Virtualization and Container Strategy

E13. Build-Cloud Strategy

E15. Build-IT Inventory Strategy

E18. Build-Network Strategy

E21. Build-Data Strategy

E24. Build-Recovery/availability Strategy

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E57. Implement-Roadmap Development based on Industry

E60. Build-Patch Management Strategy

E8. Implement-Infrastructure Strategy

Description: The E8 enabler will assist in the implementation of the infrastructure strategy defined by the organization or the E7 enabler. The infrastructure includes all aspects of the information technology environment to include hardware, software, and process. Infrastructure historically is associated with “local” information technology resources, although must also include the discussion around the integration of cloud, in most cases in a hybrid model between local infrastructure and cloud infrastructure. This Consulting session will provide a brief introduction to many of the core tenants of an infrastructure and answer questions.

 

Related Enablers (often included):

E2. Consult-Compute Technologies

E6. Consult-Infrastructure Strategy

E7. Build-Infrastructure Strategy

E10. Build-Virtualization and Container Strategy

E13. Build-Cloud Strategy

E15. Build-IT Inventory Strategy

E18. Build-Network Strategy

E21. Build-Data Strategy

E24. Build-Recovery/availability Strategy

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E9. Consult-Virtualization and Container Technologies

Description: At the conclusion of the E9 Consulting session, the E10 enabler will be instrumental with building the strategy. In the session will talk about the differences between the hypervisor and containers and their applicability within our environments. Virtualization and container technology are a means to an end, although without the introduction of automation, the environments can become very difficult to manage.  Consumers seek virtualization and containers often to drive down cost, which is a wonderful objective, although in this Consulting session we will discuss the reality of reduced cost and explore additional benefits to each of these key technologies found within our environment.  For some, this Consulting session may include an evaluation of their current virtualization environment and their movement to containers.

 

Related Enablers (often included):

E2. Consult-Compute Technologies

E6. Consult-Infrastructure Strategy

E7. Build-Infrastructure Strategy

E8. Implement-Infrastructure Strategy

E10. Build-Virtualization and Container Strategy

E11. Implement-Virtualization and Container Strategy

E12. Consult-Cloud Strategy

E13. Build-Cloud Strategy

E14. Implement-Cloud Strategy

E17. Consult-Network Strategy

E18. Build-Network Strategy

E19. Implement-Network Strategy

E20. Consult-Data Strategy

E21. Build-Data Strategy

E22. Implement-Data Strategy

E23. Consult-Recovery/availability Strategy

E10. Build-Virtualization and Container Strategy

Description: The E10 enabler will be instrumental with the building of the strategy in preparation for the implementation of the strategy found within the E11 enabler. Building a virtualization and container strategy requires a clear understanding of the environment, the skill level of the individuals managing the environment, and the business objectives that have been associated with the introduction of virtualization and containers. The strategy will map out and make suggestions based upon the actual environment, which will include interviews and data collection. At the conclusion of E10, customers will have a clear strategy with functional requirements to begin modification of an existing environment or acquisition of new technologies. In addition, a phased in/roadmap approach will be presented within the strategy.

 

Related Enablers (often included):

E2. Consult-Compute Technologies

E6. Consult-Infrastructure Strategy

E7. Build-Infrastructure Strategy

E8. Implement-Infrastructure Strategy

E9. Consult-Virtualization and Container Technologies

E11. Implement-Virtualization and Container Strategy

E12. Consult-Cloud Strategy

E13. Build-Cloud Strategy

E14. Implement-Cloud Strategy

E17. Consult-Network Strategy

E18. Build-Network Strategy

E19. Implement-Network Strategy

E20. Consult-Data Strategy

E21. Build-Data Strategy

E22. Implement-Data Strategy

E23. Consult-Recovery/availability Strategy

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E57. Implement-Roadmap Development based on Industry

E11. Implement-Virtualization and Container Strategy

Description: The E11 enabler will be instrumental with the implementation of the strategy defined by the organization or the E10 enabler. If the organization currently has a virtualization and container strategy, the strategy will be reviewed and implemented. Our expertise extends to the primary virtualization technologies to include Microsoft, VMware, Red Hat and Open Stack (which is a KVM hypervisor very similar to Red Hat) and multiple container technologies and automation to include Docker and Kubernetes.  Our implementation also includes the customization of policies to manage the automation required within either of these environments to maximize customers functionality with the technologies.

 

Related Enablers (often included):

E2. Consult-Compute Technologies

E6. Consult-Infrastructure Strategy

E7. Build-Infrastructure Strategy

E8. Implement-Infrastructure Strategy

E9. Consult-Virtualization and Container Technologies

E10. Build-Virtualization and Container Strategy

E12. Consult-Cloud Strategy

E13. Build-Cloud Strategy

E14. Implement-Cloud Strategy

E17. Consult-Network Strategy

E18. Build-Network Strategy

E19. Implement-Network Strategy

E20. Consult-Data Strategy

E21. Build-Data Strategy

E22. Implement-Data Strategy

E23. Consult-Recovery/availability Strategy

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E12. Consult-Cloud Strategy

Description: At the conclusion of the E12 Consulting session, the E13 enabler will be instrumental with building the strategy. Cloud Consulting session will a business and technical perspective, very dependent upon the recipient’s interest. Cloud strategy will explore multiple technologies to include “private” clouds either hosted at a commercial data center or within the organization’s firewall, “public” cloud technologies, hybrid cloud technologies which includes composable/converged technologies and the integration and coexistence between all the cloud-oriented technologies. It is important to note that cloud technology is not a new technology, it is simply a different delivery of technology. The Consulting session will include the details that are often glossed over when moving to cloud technologies.

 

Related Enablers (often included):

E2. Consult-Compute Technologies

E9. Consult-Virtualization and Container Technologies

E10. Build-Virtualization and Container Strategy

E11. Implement-Virtualization and Container Strategy

E13. Build-Cloud Strategy

E14. Implement-Cloud Strategy

E20. Consult-Data Strategy

E21. Build-Data Strategy

E22. Implement-Data Strategy

E60. Build-Patch Management Strategy

E13. Build-Cloud Strategy

Description: The E13 enabler will be instrumental with the building of the strategy in preparation for the implementation of the strategy found within the E14 enabler. Cloud strategy will include the items mentioned within the E12 enabler. The building of a cloud strategy includes an analysis that extends throughout the entire information technology environment. Questions related to performance, latency, data storage and the frequency at which the cloud environment will be utilized are all important variables to understand cost, risk and functionality for the organization. The E13 enabler will focus on the enterprise cloud strategy which may differ or complement the cloud strategy represented by the E61 and E62 enablers, focused at desktop/office automation usage.

 

Related Enablers (often included):

E2. Consult-Compute Technologies

E9. Consult-Virtualization and Container Technologies

E10. Build-Virtualization and Container Strategy

E11. Implement-Virtualization and Container Strategy

E12. Consult-Cloud Strategy

E14. Implement-Cloud Strategy

E20. Consult-Data Strategy

E21. Build-Data Strategy

E22. Implement-Data Strategy

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E57. Implement-Roadmap Development based on Industry

E60. Build-Patch Management Strategy

E61. Consult-Online Services Strategy

E14. Implement-Cloud Strategy

Description: The E14 enabler will be instrumental with the implementation of the strategy defined by the organization or the E13 enabler. The implementation of the cloud strategy for the organization will include migration of data, availability of information during the migration process, and a project plan authored by years of experience implementing cloud strategies.

 

Related Enablers (often included):

E2. Consult-Compute Technologies

E9. Consult-Virtualization and Container Technologies

E10. Build-Virtualization and Container Strategy

E11. Implement-Virtualization and Container Strategy

E12. Consult-Cloud Strategy

E13. Build-Cloud Strategy

E20. Consult-Data Strategy

E21. Build-Data Strategy

E22. Implement-Data Strategy

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E61. Consult-Online Services Strategy

E15. Build-IT Inventory Strategy

Description: The E15 enabler will build an information technology inventory strategy. Inventory collection and management is a key attribute of a secure environment, as it is difficult to create a secure environment without knowing where the technology assets are located. The strategy will assess and suggest modification (if required) to the current inventory collection process that includes hardware, software, servers, storage, networks, appliances and gaining importance IOT devices. The inventory strategy will include the strength of agent and agentless technologies, as well as the frequency of inventory updates in the presentation of the inventory collection, and a “test and validate” process to ensure the consistency and accuracy of your inventory.

 

Related Enablers (often included):

E16. Implement-IT Inventory collection and management

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E57. Implement-Roadmap Development based on Industry

E16. Implement-IT Inventory collection and management

Description: The E16 enabler will be instrumental with the implementation of the strategy defined by the organization or the E15 enabler.

 

Related Enablers (often included):

E15. Build-IT Inventory Strategy

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E17. Consult-Network Strategy

Description: At the conclusion of the E17 Consulting session, the E18 enabler will be instrumental with building the strategy. The Consulting session will include discussion related to network infrastructure design, to include routers, switches, web accelerators, hop management, firewalls, honeypot networks, IPS, IDS, DNS, transport/Internet/link layers, WAN optimizers, caching and other technologies of interest. The Consulting session is designed for both business and technologists. For the business consumer we will discuss the cost efficiency and savings associated with network technologies, vendor lock-in strategies that increase cost, introduce open standards like open flow to drive down cost for labor, hardware and maintenance contracts.

 

Related Enablers (often included):

E18. Build-Network Strategy

E19. Implement-Network Strategy

E23. Consult-Recovery/availability Strategy

E24. Build-Recovery/availability Strategy

E25. Implement-Recovery/availability Strategy

E26. Implement-Cyber Analysis

E29. Build-Contingency Plan

E32. Build-Cyber Security Controls

E18. Build-Network Strategy

Description: The E18 enabler will be instrumental with the building of the strategy in preparation for the implementation of the strategy found within the E19 enabler. The strategy will include the optimization of your existing network infrastructure and a roadmap to drive out cost and increase efficiencies. The inclusion or exclusion of some technologies that may currently reside within your environment will have a direct impact on the cost related to network technologies. The strategy will explore the technologies introduced within the E17 enabler as well as others.

 

Related Enablers (often included):

E17. Consult-Network Strategy

E19. Implement-Network Strategy

E23. Consult-Recovery/availability Strategy

E24. Build-Recovery/availability Strategy

E25. Implement-Recovery/availability Strategy

E26. Implement-Cyber Analysis

E29. Build-Contingency Plan

E32. Build-Cyber Security Controls

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E57. Implement-Roadmap Development based on Industry

E19. Implement-Network Strategy

Description: The E19 enabler will be instrumental with the implementation of the strategy defined by the organization or the E18 enabler.

 

Related Enablers (often included):

E17. Consult-Network Strategy

E18. Build-Network Strategy

E23. Consult-Recovery/availability Strategy

E24. Build-Recovery/availability Strategy

E25. Implement-Recovery/availability Strategy

E26. Implement-Cyber Analysis

E29. Build-Contingency Plan

E32. Build-Cyber Security Controls

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E20. Consult-Data Strategy

Description: At the conclusion of the E20 Consulting session, the E21 enabler will be instrumental with building the strategy. Data strategy for an environment can be challenging as data continues to grow at unprecedented rates. The Consulting session will review strategies to manage the data explosion to include de-duplication, drive types to include NVMe to SSD to SATA, data file types to include file and object, archiving, NAS, SAN, DAS, local to cloud storage services, recoverability and availability of data, site to site replication at the storage layer or the operating system layer, HBA and HVA technologies and several others. From a business perspective the discussion will focus on utilization, cost per gigabyte, automated movement of workloads, commercial cloud versus local storage versus cloud hosted storage and other variables that have a direct impact on the functionality of the cloud service and cost-saving strategies.

 

Related Enablers (often included):

E12. Consult-Cloud Strategy

E13. Build-Cloud Strategy

E14. Implement-Cloud Strategy

E21. Build-Data Strategy

E22. Implement-Data Strategy

E23. Consult-Recovery/availability Strategy

E24. Build-Recovery/availability Strategy

E25. Implement-Recovery/availability Strategy

E30. Build-Risk Assessment Plan

E31. Consult-Cyber Security Controls

E32. Build-Cyber Security Controls

E33. Implement-Cyber Security Controls

E21. Build-Data Strategy

Description: The E21 enabler will be instrumental with the building of the strategy in preparation for the implementation of the strategy found within the E22 enabler. Data strategy for an environment can be challenging as data continues to grow at unprecedented rates. The strategy will include the ability to manage the data explosion to include de-duplication, drive types to include NVMe to SSD to SATA, data file types to include file and object, archiving, NAS, SAN, DAS, local to cloud storage services, recoverability and availability of data, site to site replication at the storage layer or the operating system layer, HBA and HVA technologies and several others.

 

Related Enablers (often included):

E12. Consult-Cloud Strategy

E13. Build-Cloud Strategy

E14. Implement-Cloud Strategy

E20. Consult-Data Strategy

E22. Implement-Data Strategy

E23. Consult-Recovery/availability Strategy

E24. Build-Recovery/availability Strategy

E25. Implement-Recovery/availability Strategy

E30. Build-Risk Assessment Plan

E31. Consult-Cyber Security Controls

E32. Build-Cyber Security Controls

E33. Implement-Cyber Security Controls

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E57. Implement-Roadmap Development based on Industry

E22. Implement-Data Strategy

Description: The E22 enabler will be instrumental with the implementation of the strategy defined by the organization or the E21 enabler.

 

Related Enablers (often included):

E12. Consult-Cloud Strategy

E13. Build-Cloud Strategy

E14. Implement-Cloud Strategy

E20. Consult-Data Strategy

E21. Build-Data Strategy

E23. Consult-Recovery/availability Strategy

E24. Build-Recovery/availability Strategy

E25. Implement-Recovery/availability Strategy

E30. Build-Risk Assessment Plan

E31. Consult-Cyber Security Controls

E32. Build-Cyber Security Controls

E33. Implement-Cyber Security Controls

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E23. Consult-Recovery/availability Strategy

Description: At the conclusion of the E23 Consulting session, the E24 enabler will be instrumental with building the strategy. The availability of information and services is critical to the functionality within an organization. The E23 Consulting session will discuss the many decisions that need to be made related to a recovery and availability strategy. We will start with discussing the services that currently exist within the environment and the need to classify the services and data as to their importance to the organization. For example, I have services (email, data sharing, web store) running within my organization. In the event of a failure, what services need to be restored within 30 minutes, four hours, 24 hours and how much data are you willing to lose? This level of questioning will assist you in designing an effective recovery and availability strategy for the organization. The reality is, not all services will be restored at the same time, and cost is directly associated with the level of service you are providing. We will discuss different types of synchronization technologies from the host level operating system to appliances and storage devices within the environment, and how latency can impact the difference between synchronous and asynchronous replication strategies. For some environments, the recovery and availability of services may be as simple as image capture and restoration.

 

Related Enablers (often included):

E20. Consult-Data Strategy

E21. Build-Data Strategy

E22. Implement-Data Strategy

E24. Build-Recovery/availability Strategy

E25. Implement-Recovery/availability Strategy

E28. Build-System Security Plan (SSP)

E29. Build-Contingency Plan

E30. Build-Risk Assessment Plan

E24. Build-Recovery/availability Strategy

Description: The E24 enabler will be instrumental with the building of the strategy in preparation for the implementation of the strategy found within the E25 enabler. The strategy will look at all aspects of recoverability and availability built upon the priorities established by the organization. The strategy will review options and provide functional requirements to establish recoverability/availability of services and data within the organization, taking into consideration cost, security and the organizations priorities.  E23 has additional details.

 

Related Enablers (often included):

E20. Consult-Data Strategy

E21. Build-Data Strategy

E22. Implement-Data Strategy

E23. Consult-Recovery/availability Strategy

E25. Implement-Recovery/availability Strategy

E28. Build-System Security Plan (SSP)

E29. Build-Contingency Plan

E30. Build-Risk Assessment Plan

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E57. Implement-Roadmap Development based on Industry

E25. Implement-Recovery/availability Strategy

Description: The E25 enabler will be instrumental with the implementation of the strategy defined by the organization or the E24 enabler.

 

Related Enablers (often included):

E20. Consult-Data Strategy

E21. Build-Data Strategy

E22. Implement-Data Strategy

E23. Consult-Recovery/availability Strategy

E24. Build-Recovery/availability Strategy

E28. Build-System Security Plan (SSP)

E29. Build-Contingency Plan

E30. Build-Risk Assessment Plan

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E26. Implement-Cyber Analysis

Description: The E26 enabler will be instrumental with the implementation of the strategy defined by the organization or the E27 enabler. With the ever-growing threat of a cyber-attack impacting an average of 15% -25% (up 3% from last year) of all organizations annually, with an average cost of recovery ranging from $250,000 to $4 million, organizations are paying closer attention to their cyber health. The implementation services within the E26 enabler will build many of the required security plans, review current log aggregation and event log management, examine the patch management strategy for the organization and perform other tasks that may include vulnerability and penetration scans. The analysis will also examine current event logs for known vulnerabilities and compare them with security policy objectives. This is an analysis and preparation enabler. Items may be discovered, for example hardening of a server, that can be added to the scope of work.

 

Related Enablers (often included):

E28. Build-System Security Plan (SSP)

E29. Build-Contingency Plan

E30. Build-Risk Assessment Plan

E31. Consult-Cyber Security Controls

E32. Build-Cyber Security Controls

E33. Implement-Cyber Security Controls

E48. Consult-Aggregators and SIEMS

E49. Build-Event Log Strategy

E50. Implement-Event Log Strategy

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E60. Build-Patch Management Strategy

E27. Build-Cyber Policy

Description: The E27 enabler will be instrumental with the building of the strategy. Cyber policy is an overarching collection of rules and requirements to maintain cyber health throughout the environment. The building of a cyber policy includes user access policy, password policy, port policies, notification policies, QOS policy, system security plan, contingency plan, risk assessment plan, IT security policies, incident reporting, Internet vulnerabilities, employee and contractor exit policies, email encryption policy, email and Internet use policy, electronic acknowledgment policy, wireless policy, firewall policy, certification and accreditation guidelines and requirements, mobile device policy, breach policy, virtual server implementation policy, vulnerability assessment policy, protocol review policy and others is defined by the environment. The building of a cyber policy does not include the building of the security controls, which are the execution or enablement of the policy (see E31 to E33).

 

Related Enablers (often included):

E28. Build-System Security Plan (SSP)

E29. Build-Contingency Plan

E30. Build-Risk Assessment Plan

E31. Consult-Cyber Security Controls

E32. Build-Cyber Security Controls

E33. Implement-Cyber Security Controls

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E28. Build-System Security Plan (SSP)

Description: The E28 enabler will be instrumental with the building of the strategy in preparation for the implementation of the strategy found within the E27 enabler.  System security plans primarily focus on the strategy to protect and control information and services within an organization, serving as a benchmark of what right looks like. The implementation of a system security plan will vary dependent upon the organizations regulatory requirement or business vertical, although most system security plans are based on the United States Federal Government and SANS standards. Building a system security plan is grounded with the following common attributes: identify what systems within your environment require a system security plan and document how that system operates, identify the system owner the support staff and security staff so that there is a line of accountability, identify the administrative and business operations that are required and the staff to support those efforts. Once this information is been collected, the next step is to develop the controls required to support and provide accountability to the system security plan. At the conclusion of the work listed above, as well as other details not mentioned, a plan of remediation must be implemented. The system security plan establishes the baseline of what right looks like, the identification of staff and system artifacts are important, although without a plan of remediation when threat is discovered leaves you with very little cyber protection. The establishment of a system security plan is a document, the effectiveness of the plan is found in the development of the controls and accountability therein.

 

Related Enablers (often included):

E2. Consult-Compute Technologies

E4. Build-Analytics Strategy

E7. Build-Infrastructure Strategy

E10. Build-Virtualization and Container Strategy

E13. Build-Cloud Strategy

E15. Build-IT Inventory Strategy

E18. Build-Network Strategy

E21. Build-Data Strategy

E24. Build-Recovery/availability Strategy

E31. Consult-Cyber Security Controls

E32. Build-Cyber Security Controls

E33. Implement-Cyber Security Controls

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E60. Build-Patch Management Strategy

E62. Build-Online Services Strategy

E65. Build- Desktop Modernization Strategy

E29. Build-Contingency Plan

Description: The E29 enabler will be instrumental with the building of the strategy in preparation for the implementation of the strategy found within the E27 and E28 enablers. Cyber contingency plan is designed to enable an organization to return to operational strength as soon as possible following a security breach. The cyber contingency plan includes steps to continue critical operations (see E23 and E24 - recoverability and availability strategy), contain the damage to digital assets to include personal and organization data.  Once the situation is been contained and critical operations are functional, a restoration plan is initiated. The contingency plan includes data points from many of the other strategy documents.

 

Related Enablers (often included):

E2. Consult-Compute Technologies

E4. Build-Analytics Strategy

E7. Build-Infrastructure Strategy

E10. Build-Virtualization and Container Strategy

E13. Build-Cloud Strategy

E15. Build-IT Inventory Strategy

E18. Build-Network Strategy

E21. Build-Data Strategy

E24. Build-Recovery/availability Strategy

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E60. Build-Patch Management Strategy

E62. Build-Online Services Strategy

E65. Build- Desktop Modernization Strategy

E30. Build-Risk Assessment Plan

Description: The E30 enabler will be instrumental with the building of the strategy in preparation for the implementation of the strategy found within the E27 and E28 enabler.  With the ever-increasing dependency upon digital processing for organizations, a digital risk assessment plan or digital risk management plan is the next evolution in managing enterprise and security risk. The digital risk assessment plan clearly illustrates that digital risk to an organization is a business issue that is founded in technology, although is not just a technology issue. The enlightened definition and the implementation of a risk assessment plan for an organization assist in the transference or shared responsibility of digital risk between the “C suite” and information technology leaders. The risk assessment plan includes the management of digital risk across multiple lines of business to include information technology and security through the alignment of risk to business impact. Once the alignment of risk is been established, the risk assessment plan assists executives and organizations to understand the digital risk to their business and provide them with the strategy and decision points needed to balance the need to protect their organization with the need to run their organization. The objective of a risk assessment plan is to establish digital resiliency, detect digital threats and respond to minimize business impact and ultimately financial loss.

 

Related Enablers (often included):

E2. Consult-Compute Technologies

E4. Build-Analytics Strategy

E7. Build-Infrastructure Strategy

E10. Build-Virtualization and Container Strategy

E13. Build-Cloud Strategy

E15. Build-IT Inventory Strategy

E18. Build-Network Strategy

E21. Build-Data Strategy

E24. Build-Recovery/availability Strategy

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E60. Build-Patch Management Strategy

E62. Build-Online Services Strategy

E65. Build- Desktop Modernization Strategy

E31. Consult-Cyber Security Controls

Description: At the conclusion of the E31 Consulting session, the E32 enabler will be instrumental with building the strategy. Understanding the number of cyber security controls in the industry is likened to understanding tax law, few of us understand it or have the desire to understand. The Consulting session will assist customers in understanding the objectives of cyber security controls and expose them to strategies on establishing their cyber security strength. There are multiple established bodies of controls that are used as baselines, although the ultimate objective is to secure the environment. In order to secure the environment, the establishment of the security controls must start from the objective and move backward. In most environments, the implementation of security controls is built upon regulatory requirements, which can be a good first start, although unavoidably leaves gaps in the cyber security strategy. During this Consulting session we will discuss the value of understanding cyber objectives (data protection, insider threat, firewall standards) and assist you in finding the controls to meet your needs.

 

Related Enablers (often included):

E2. Consult-Compute Technologies

E4. Build-Analytics Strategy

E7. Build-Infrastructure Strategy

E10. Build-Virtualization and Container Strategy

E13. Build-Cloud Strategy

E15. Build-IT Inventory Strategy

E18. Build-Network Strategy

E21. Build-Data Strategy

E24. Build-Recovery/availability Strategy

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E60. Build-Patch Management Strategy

E62. Build-Online Services Strategy

E65. Build- Desktop Modernization Strategy

E32. Build-Cyber Security Controls

Description: The E32 enabler will be instrumental with the building of the strategy in preparation for the implementation of the strategy found within the E33 enabler. Building cyber security control includes the control objective, description, control type and language to implement the control within the environment. Developing controls frequently aligned to regulatory requirements, although can be very customized and unique for the needs of the organization.  E32 is a process of creating the controls, whereas E33 is the process of implementing those controls within the environment.

 

Related Enablers (often included):

E2. Consult-Compute Technologies

E4. Build-Analytics Strategy

E7. Build-Infrastructure Strategy

E10. Build-Virtualization and Container Strategy

E13. Build-Cloud Strategy

E15. Build-IT Inventory Strategy

E18. Build-Network Strategy

E21. Build-Data Strategy

E24. Build-Recovery/availability Strategy

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E60. Build-Patch Management Strategy

E62. Build-Online Services Strategy

E65. Build- Desktop Modernization Strategy

E33. Implement-Cyber Security Controls

Description: The E33 enabler will be instrumental with the implementation of the strategy defined by the organization or the E32 enabler. The implementation of cyber security controls requires what is frequently referred to as “hardening” of the system. The cyber security controls provide the instruction and objective, and the action associated with the security control is the implementation. It is not uncommon during the implementation to adjust multiple controls to make one control functional.

 

Related Enablers (often included):

E2. Consult-Compute Technologies

E4. Build-Analytics Strategy

E7. Build-Infrastructure Strategy

E10. Build-Virtualization and Container Strategy

E13. Build-Cloud Strategy

E15. Build-IT Inventory Strategy

E18. Build-Network Strategy

E21. Build-Data Strategy

E24. Build-Recovery/availability Strategy

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E60. Build-Patch Management Strategy

E62. Build-Online Services Strategy

E65. Build- Desktop Modernization Strategy

E34. Build-Inventory Management Strategy

Description: The E34 enabler will be instrumental with the building of the strategy.  Building and inventory management strategy allows for the review of existing strategy or newly developed strategy to collect information about all electronic assets within the environment. Inventory management for information technology, typically addresses any component that uses a network protocol to communicate, frequently TCP/IP. The identification and strength of an inventory management strategy allows for the identification of rogue components on the network, which directly impact the security of the environment. Inventory management for most environments is lacking, although the inventory management strategy enabler is something all organizations should leverage to either check their existing solution or suggest new solutions.

 

Related Enablers (often included):

E16. Implement-IT Inventory collection and management

E35. Implement-Inventory Management

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E57. Implement-Roadmap Development based on Industry

E35. Implement-Inventory Management

Description: The E35 enabler will be instrumental with the implementation of the strategy defined by the organization or the E34 enabler. The implementation of an inventory management solution can be complex dependent upon the size of the organization. The implementation will follow the strategy, or a customer provided strategy.

 

Related Enablers (often included):

E15. Build-IT Inventory Strategy

E34. Build-Inventory Management Strategy

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E36. Consult-US Federal

Description: The E36 enabler will be instrumental with building a US Federal strategy for your organization. Understanding the US marketplace can be a challenge for individuals and organizations wishing to conduct business with the United States federal government. This Consulting session introduces and strengthens customers understanding of US federal business vertical. The Consulting session typically reviews everything from understanding the differences between the different types of federal agencies to contracting rules and regulations found with in the FAR.  If your organization is developing solutions to be used with in the United States federal government, this Consulting session would be great for you to understand more about some of those things that you need to do when preparing to work for the US Government. 

 

Related Enablers (often included):

E38. Build-DFARS Strategy

E39. Implement-DFARS

E40. Consult-508 Compliance

E41. Build-508 Compliance

E42. Implement-508 Compliance

E43. Consult-NIST Compliance

E44. Build-NIST Compliance

E45. Implement-NIST Compliance

E46. Implement-Policy to NIST compliance

E47. Build-hardware/software to NIST Strategy

E37. Consult-DFARS

Description: At the conclusion of the E37 Consulting session, the E38 enabler will be instrumental with building the strategy. DFARS is a security standard designed to assist the Department of Defense in maintaining a consistent cyber strength among partners, integrators and vendors that provide services and solutions to United States Department of Defense.

 

Related Enablers (often included):

E39. Implement-DFARS

E40. Consult-508 Compliance

E38. Build-DFARS Strategy

Description: The E38 enabler will be instrumental with the building of the strategy in preparation for the implementation of the strategy found within the E39 enabler.  Building a DFARS strategy requires an understanding of the customer’s environment to identify gaps that may need to be bridged or filled prior to performing as a DFARS approved vendor.

 

Related Enablers (often included):

E38. Build-DFARS Strategy

E40. Consult-508 Compliance

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E39. Implement-DFARS

Description: The E39 enabler will be instrumental with the implementation of the strategy defined by the organization or the E38 enabler.

 

Related Enablers (often included):

E38. Build-DFARS Strategy

E39. Implement-DFARS

E40. Consult-508 Compliance

Description: At the conclusion of the E40 Consulting session, the E41 enabler will be instrumental with building the strategy.

 

Related Enablers (often included):

E41. Build-508 Compliance

E42. Implement-508 Compliance

E41. Build-508 Compliance

Description: The E41 enabler will be instrumental with the building of the strategy in preparation for the implementation of the strategy found within the E42 enabler.

 

Related Enablers (often included):

E40. Consult-508 Compliance

E42. Implement-508 Compliance

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E42. Implement-508 Compliance

Description: The E42 enabler will be instrumental with the implementation of the strategy defined by the organization or the E41 enabler.

 

Related Enablers (often included):

E40. Consult-508 Compliance

E41. Build-508 Compliance

E43. Consult-NIST Compliance

Description: At the conclusion of the E43 Consulting session, the E44 enabler will be instrumental with building the strategy.

 

Related Enablers (often included):

E44. Build-NIST Compliance

E45. Implement-NIST Compliance

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E44. Build-NIST Compliance

Description: The E44 enabler will be instrumental with the building of the strategy in preparation for the implementation of the strategy found within the E45 enabler.

 

Related Enablers (often included):

E43. Consult-NIST Compliance

E45. Implement-NIST Compliance

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E45. Implement-NIST Compliance

Description: The E45 enabler will be instrumental with the implementation of the strategy defined by the organization or the E44 enabler.

 

Related Enablers (often included):

E43. Consult-NIST Compliance

E44. Build-NIST Compliance

E46. Implement-Policy to NIST compliance

Description: The E46 enabler will be instrumental with the analysis of your current policy to NIST controls and policies.

 

Related Enablers (often included):

E43. Consult-NIST Compliance

E44. Build-NIST Compliance

E45. Implement-NIST Compliance

E46. Implement-Policy to NIST compliance

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E47. Build-hardware/software to NIST Strategy

Description: The E47 enabler will assist the organization in understanding the NIST controls that are satisfied by the hardware / software.  This is a value-add for customers.

 

Related Enablers (often included):

E43. Consult-NIST Compliance

E44. Build-NIST Compliance

E45. Implement-NIST Compliance

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E48. Consult-Aggregators and SIEMS

Description: At the conclusion of the E48 Consulting session, the E49 enabler will be instrumental with building the strategy.

 

Related Enablers (often included):

E26. Implement-Cyber Analysis

E27. Build-Cyber Policy

E31. Consult-Cyber Security Controls

E49. Build-Event Log Strategy

E50. Implement-Event Log Strategy

E49. Build-Event Log Strategy

Description: The E49 enabler will be instrumental with the building of the strategy in preparation for the implementation of the strategy found within the E50 enabler.

 

Related Enablers (often included):

E26. Implement-Cyber Analysis

E27. Build-Cyber Policy

E31. Consult-Cyber Security Controls

E32. Build-Cyber Security Controls

E33. Implement-Cyber Security Controls

E48. Consult-Aggregators and SIEMS

E50. Implement-Event Log Strategy

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E50. Implement-Event Log Strategy

Description: The E50 enabler will be instrumental with the implementation of the strategy defined by the organization or the E49 enabler.

 

Related Enablers (often included):

E26. Implement-Cyber Analysis

E27. Build-Cyber Policy

E31. Consult-Cyber Security Controls

E32. Build-Cyber Security Controls

E33. Implement-Cyber Security Controls

E48. Consult-Aggregators and SIEMS

E49. Build-Event Log Strategy

E51. Implement-Technical Writing

 

E51. Implement-Technical Writing

Description: The E51 enabler provides technical writing for RFP, RFQ, RFI, Whitepapers, Blogs, Books and other material.

 

Related Enablers (often included):

E52. Implement-Technical Visualization

E52. Implement-Technical Visualization

Description: The E52 enabler provides technical visualization for RFP, RFQ, RFI, Whitepapers, Blogs, Books, training videos and other material.

 

Related Enablers (often included):

E51. Implement-Technical Writing

 

E53. Consult-Industry Interest Analysis

Description: The E53 Consulting session reviews the industry focused interest analysis.

 

Related Enablers (often included):

E54. Implement-Industry Interest Analysis

E54. Implement-Industry Interest Analysis

Description: The E54 enabler will consume a defined set of information and produce a customized interest analysis.

 

Related Enablers (often included):

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E53. Consult-Industry Interest Analysis

E55. Implement-RFx Analysis and Alignment to Business

Description: Organizations process hundreds of requests for quote (RFP, RFQ, RFI) to discover opportunities. The process tends to be very manual and time-consuming for most organizations. The E55 enabler provides different levels with the intelligence to narrow down the hundreds of requests to the few that apply directly to the organization. If you’re looking to increase your opportunities and focus only on those that have a higher probability of when, this enabler is for you.

 

Related Enablers (often included):

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E54. Implement-Industry Interest Analysis

E56. Implement-RFx to Response Analysis

E56. Implement-RFx to Response Analysis

Description: The E56 enabler assist organizations with the analysis of a response to an RFP, RFQ, RFI. The process includes reviewing the RFP, RFQ, RFI request language and performing a comparison to the response language. This provides insight as to the effectiveness of the organization’s response and can directly impact the win ratio for the organization.

 

Related Enablers (often included):

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E57. Implement-Roadmap Development based on Industry

Description: Coupled with the E53 and E54 enablers, the E57 enabler will provide a roadmap of the industry demand with an organization’s current offerings and communications. The insight for the roadmap is typically extracted from strategic plans provided by large organizations, governments and countries. The mixture of these multiple strategic plans, representing customers throughout the globe, provides a very accurate visibility to purchasing habits. Organizations are bound to their strategic plans. If you’re wondering which direction your organization may want to take, this is a must-have enabler.

 

Related Enablers (often included):

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E53. Consult-Industry Interest Analysis

E54. Implement-Industry Interest Analysis

E58. Implement-Application Development

Description: The E58 assists organizations

 

Related Enablers (often included):

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E59. Implement-Cyber Compliance

Description: The E59 enabler will

 

Related Enablers (often included):

E28. Build-System Security Plan (SSP)

E29. Build-Contingency Plan

E30. Build-Risk Assessment Plan

E31. Consult-Cyber Security Controls

E32. Build-Cyber Security Controls

E33. Implement-Cyber Security Controls

E48. Consult-Aggregators and SIEMS

E49. Build-Event Log Strategy

E50. Implement-Event Log Strategy

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E60. Build-Patch Management Strategy

 

E60. Build-Patch Management Strategy

Description: The E60 enabler will be instrumental with the building of the strategy in preparation for the implementation of your organizations strategy.

 

Related Enablers (often included):

E6. Consult-Infrastructure Strategy

E7. Build-Infrastructure Strategy

E8. Implement-Infrastructure Strategy

E9. Consult-Virtualization and Container Technologies

E10. Build-Virtualization and Container Strategy

E11. Implement-Virtualization and Container Strategy

E12. Consult-Cloud Strategy

E13. Build-Cloud Strategy

E14. Implement-Cloud Strategy

E17. Consult-Network Strategy

E18. Build-Network Strategy

E19. Implement-Network Strategy

E20. Consult-Data Strategy

E21. Build-Data Strategy

E22. Implement-Data Strategy

E26. Implement-Cyber Analysis

E28. Build-System Security Plan (SSP)

E31. Consult-Cyber Security Controls

E32. Build-Cyber Security Controls

E33. Implement-Cyber Security Controls

 

E61. Consult-Online Services Strategy

Description: At the conclusion of the E61 Consulting session, the E62 enabler will be instrumental with building the strategy.

 

Related Enablers (often included):

E62. Build-Online Services Strategy

E63. Implement-Office 365 Strategy

E64. Consult-Desktop Modernization Strategy

E65. Build- Desktop Modernization Strategy

E66. Implement- Desktop Modernization Strategy

 

E62. Build-Online Services Strategy

Description: The E62 enabler will be instrumental with the building of the strategy in preparation for the implementation of the strategy found within the E63 enabler.

 

Related Enablers (often included):

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E61. Consult-Online Services Strategy

E63. Implement-Office 365 Strategy

E64. Consult-Desktop Modernization Strategy

E65. Build- Desktop Modernization Strategy

E66. Implement- Desktop Modernization Strategy

 

E63. Implement-Office 365 Strategy

Description: The E63 enabler will be instrumental with the implementation of the strategy defined by the organization or the E62 enabler.

 

Related Enablers (often included):

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E61. Consult-Online Services Strategy

E62. Build-Online Services Strategy

E64. Consult-Desktop Modernization Strategy

E65. Build- Desktop Modernization Strategy

E66. Implement- Desktop Modernization Strategy

 

E64. Consult-Desktop Modernization Strategy

Description: At the conclusion of the E64 Consulting session, the E65 enabler will be instrumental with building the strategy.

 

Related Enablers (often included):

E65. Build- Desktop Modernization Strategy

E66. Implement- Desktop Modernization Strategy

 

E65. Build- Desktop Modernization Strategy

Description: The E65 enabler will be instrumental with the building of the strategy in preparation for the implementation of the strategy found within the E64 enabler.

 

Related Enablers (often included):

E50. Implement-Event Log Strategy

E51. Implement-Technical Writing

E64. Consult-Desktop Modernization Strategy

E66. Implement- Desktop Modernization Strategy

 

E66. Implement- Desktop Modernization Strategy

Description: The E66 enabler will be instrumental with the implementation of the strategy defined by the organization or the E65 enabler.

 

Related Enablers (often included):

E64. Consult-Desktop Modernization Strategy

E65. Build- Desktop Modernization Strategy

 

E67. Build- Subject Matter Expert (Infrastructure)

Description: The E67 enabler provides consulting efforts related to Infrastructure to include server, storage, network, cloud, IoT and supporting software and operating systems found within the infrastructure. Customers frequently select this enabler to assist with general CTO related tasks, assistance with RFP/RFQ/RFI response, etc..

 

Related Enablers (often included):

E1. Build-IT Acquisition Strategy

E2. Consult-Compute Technologies

E3. Consult-Analytics, IoT and AI working together

E6. Consult-Infrastructure Strategy

E9. Consult-Virtualization and Container Technologies

E12. Consult-Cloud Strategy

E17. Consult-Network Strategy

E20. Consult-Data Strategy

E23. Consult-Recovery/availability Strategy

E50. Implement-Event Log Strategy

E51. Implement-Technical Writing

E68. Build-Subject Matter Expert (Cyber)

E65. Build- Desktop Modernization Strategy

 

E68. Build- Subject Matter Expert (Cyber)

Description: The E68 enabler provides consulting efforts related to Cyber Security to include: analysis of a current state of readiness within an organization, scoping required for control and policy development, general consulting related to cyber concerns. Customers frequently select this enabler to assist with general CISO related tasks, assistance with RFP/RFQ/RFI response, etc.

 

Related Enablers (often included):

E26. Implement-Cyber Analysis

E27. Build-Cyber Policy

E28. Build-System Security Plan (SSP)

E29. Build-Contingency Plan

E30. Build-Risk Assessment Plan

E31. Consult-Cyber Security Controls

E36. Consult-US Federal

E37. Consult-DFARS

E40. Consult-508 Compliance

E43. Consult-NIST Compliance

E48. Consult-Aggregators and SIEMS

E50. Implement-Event Log Strategy

E51. Implement-Technical Writing

E67. Build-Subject Matter Expert (Infrastructure)

 

 

E69. Implement – Event Log Analysis

Description: The E69 enabler provides the analysis of log files related to defined system components against the established baseline or policy.  The service reviews existing logs found within the system and compares discovered threats to existing controls and baselines. This provides customers with real time health assessment of controls. Very useful with compliance activities.

 

E70. Build – Report and Tasks

Description: The E70 enabler provides reporting an outline of tasks for the customer to complete. The reporting allows the customer to establish a current status, while providing for them the opportunity to complete the tasks with their current resources. TechnologyMilestones is available to assist with task execution as well.

 

E71. Build – Business aligned to Cyber

Description: The E71 enabler provides the analysis to align business need with cyber requirements, controls and baselines. Establishing the correct set of controls and baselines will allow organizations to fine-tune their cyber protection based on the business objective, as well allow the organization to prioritize remediation tasks based on business objectives and not simply cyber events.

 

E72. Build – System Priorities

Description: The E72 enabler reviews the organizations business objectives and prioritizes systems within the information technology environment. This alignment allows organizations to understand recovery times, availability of information, and potential loss of data. Breaking down the organization by business objectives and then aligning those objectives to the technology “systems” that support the business objectives will inadvertently save the organization cost and level set expectations throughout the organization. For example, many organizations use the same level of disaster recovery or high-availability for all aspects and technologies within their environment. This approach, although may appear to be simpler on the surface, can dramatically increase the cost of information technology. TechnologyMilestones takes an agnostic approach to system architecture and can provide a cost-effective approach to establishing and organizations “systems” in support of business outcomes.

 

E73. Implement – Inventory Collection

Description: The E73 enabler is the collection of information technology inventory for an organization performed by TechnologyMilestones staff. The output from this enabler/service is a CSV file that can be imported into any inventory collection system.  TechnologyMilestones staff will also work with on-site inventory software used by the customer.

 

E74. Build – Technology Utilization

Description: The E74 enabler analyzes the current utilization of hardware and software resources within the organization and provide suggested cost savings. Understanding how storage is utilized, server processing resources are distributed, and network infrastructure is designed can have a direct impact on cost, availability and maintenance of an organization’s information technology environment. The E74 enabler/service produces a report of suggested actions that can be taken to drive down cost and increase efficiency.

 

E75. Implement – Internal PEN Testing

Description: The E75 enabler/service conducts vulnerability and penetration testing of your infrastructure from within your firewall. The output from the service provides the organization with a “to do” list to remediate discovered vulnerabilities.

 

E76. Implement – External PEN Testing

Description: The E76 enabler/service conducts vulnerability and penetration testing against your environment from external sources. The output from the service provides the organization with a “to do” list to remediate discovered vulnerabilities.

E77. Implement – Event Remediation

Description: The E77 enabler/service is used for event remediation related to discovered vulnerabilities or other services found within TechnologyMilestones.  E77 may also include the installation and configuration of hardware and software within the environment as needed for remediation tasks.

E78. Build – Reduce IT Cost

Description: The E78 enabler/service is an analysis of IT cost, subscriptions, warranties and other associated cost and provides alternatives and potential cost reduction efforts. 

E79. Build – Build Infrastructure Roadmap

Description: The E79 enabler/service build an information technology roadmap (1 to 3 years) based on existing assets and business objectives, aligned with current advancements in technology and infrastructure.

E80. Build – Build Analytics, IoT, Cyber Roadmap  

Description: The E80 enabler/service is designed to build in analytic, IoT, cyber roadmap (1 to 3 years) based on existing assets and business objectives, aligned with current enhancements and emerging technologies.

E81. Build – Build Cloud Roadmap  

Description: The E81 enabler/service is designed to build a cloud roadmap exploring local, hosted, hybrid and public cloud utilization models.

E82. Build – IT to Cloud Roadmap and Cost

Description: The E81 enabler/service is designed to build a roadmap for the migration from a local IT infrastructure to a cloud infrastructure. During the analysis, existing resources and assets will be analyzed for viability of moving to a cloud environment and balanced against current business objectives. The roadmap will include a phased in approach with thorough test plans and migration strategies.

E83. Build – Gap Analysis

Description: The E83 enabler/service will analyze current resources and assets, compared to a defined standard, and produce a gap list of customer tasks to become a compliant organization.

E84. Build – Cyber Policy Review

Description: The E84 enabler/service will analyze an organization’s current cyber policy, regardless of format, and provide a NIST control map to satisfy the cyber policies. This allows an organization to convert from their existing cyber policies into a NIST based framework.

E85. Build – Compliance Tasks

Description: The E85 produces a task list of compliance activities that are required for the environment to meet compliance regulations.

E86. Build – RFx to RFx Response Analysis

Description: The E86 creates a list of key phrases found within the RFx and compares the phrases to the response. This effort gives immediate insight as to the effectiveness of the response, and can increase win ratio considerably.

E87. Implement – Scan URLs

Description: Screen reading of information for compliance activities. 

E88. Implement – Task List for Compliance

Description: Creation of tasks for customers that includes an export of a CSV and/or GANTT chart.

E89. Implement – Review customer Inventory

Description: Customer provides inventory that is reviewed by TM engineer.

E90. Implement – Service Alignment

Description: Align services to an organization’s outcomes.

E91. Implement – Purchase Components

Description: Acquisition of hardware, software, operating system, components needed for the organization.

E92. Implement – Install Components

Description: Installation of hardware, software, operating system, components needed for the organization.

 

 

 

 

 

LIST OF ALL ENABLERS

E0. Consult-free introduction to TechnologyMilestones

E1. Build-IT Acquisition Strategy

E2. Consult-Compute Technologies

E3. Consult-Analytics, IoT and AI working together

E4. Build-Analytics Strategy

E5. Implement-Analytic Strategy

E6. Consult-Infrastructure Strategy

E7. Build-Infrastructure Strategy

E8. Implement-Infrastructure Strategy

E9. Consult-Virtualization and Container Technologies

E 10. Build-Virtualization and Container Strategy

E11. Implement-Virtualization and Container Strategy

E12. Consult-Cloud Strategy

E13. Build-Cloud Strategy

E14. Implement-Cloud Strategy

E15. Build-IT Inventory Strategy

E16. Implement-IT Inventory collection and management

E17. Consult-Network Strategy

E18. Build-Network Strategy

E19. Implement-Network Strategy

E20. Consult-Data Strategy

E21. Build-Data Strategy

E22. Implement-Data Strategy

E23. Consult-Recovery/availability Strategy

E24. Build-Recovery/availability Strategy

E25. Implement-Recovery/availability Strategy

E26. Implement-Cyber Analysis

E27. Build-Cyber Policy

E28. Build-System Security Plan (SSP)

E29. Build-Contingency Plan

E30. Build-Risk Assessment Plan

E31. Consult-Cyber Security Controls

E32. Build-Cyber Security Controls

E33. Implement-Cyber Security Controls

E34. Build-Inventory Management Strategy

E35. Implement-Inventory Management

E36. Consult-US Federal

E37. Consult-DFARS

E38. Build-DFARS Strategy

E39. Implement-DFARS

E40. Consult-508 Compliance

E41. Build-508 Compliance

E42. Implement-508 Compliance

E43. Consult-NIST Compliance

E44. Build-NIST Compliance

E45. Implement-NIST Compliance

E46. Implement-Policy to NIST compliance

E47. Build-hardware/software to NIST Strategy

E48. Consult-Aggregators and SIEMS

E49. Build-Event Log Strategy

E50. Implement-Event Log Strategy

E51. Implement-Technical Writing

E52. Implement-Technical Visualization

E53. Consult-Industry Interest Analysis

E54. Implement-Industry Interest Analysis

E55. Implement-RFx Analysis and Alignment to Business

E56. Implement-RFx to Response Analysis

E57. Implement-Roadmap Development based on Industry

E58. Implement-Application Development

E59. Implement-Cyber Compliance

E60. Build-Patch Management Strategy

E61. Consult-Online Services Strategy

E62. Build-Online Services Strategy

E63. Implement-Office 365 Strategy

E64. Consult-Desktop Modernization Strategy

E65. Build- Desktop Modernization Strategy

E66. Implement- Desktop Modernization Strategy

E67. Build- Subject Matter Expert (Infrastructure)

E68. Build- Subject Matter Expert (Cyber)

E69. Implement – Event Log Analysis

E70. Build – Report and Tasks    

E71. Build – Business aligned to Cyber   

E72. Build – System Priorities     

E73. Implement – Inventory Collection  

E74. Build – Technology Utilization          

E75. Implement – Internal PEN Testing  

E76. Implement – External PEN Testing

E77. Implement – Event Remediation    

E78. Build – Reduce IT Cost         

E79. Build – Build Infrastructure Roadmap           

E80. Build – Build Analytics, IoT, Cyber Roadmap

E81. Build – Build Cloud Roadmap           

E82. Build – IT to Cloud Roadmap and Cost          

E83. Build – Gap Analysis             

E84. Build – Cyber Policy Review              

E85. Build – Compliance Tasks   

E86. Build – RFx to RFx Response Analysis   

E87. Implement – Scan URLs

E88. Implement – Task List for Compliance         

E89. Implement – Review customer Inventory   

E90. Implement – Service Alignment      

E91. Implement – Purchase Components            

E92. Implement – Install Components

TechnologyMilestones.com    info@technologymilestones.com

Arlington, Virginia, United States