SlideShare a Scribd company logo
Conquest Security Capabilities
Conquest Security, Inc.
 Founded in April, 2005
• Gaithersburg, MD
 Government and Commercial Clients in MD, DC, & VA
 An SBA 8(a) Certified Business (03/05/2016)
 GSA Schedule 70 (GS-35F-0842R)
 NITAAC CIO-SP3 (CTA)
• BCT Partners
• Small Business set-aside: 7/15/2012 – 7/14/2022
• 8(a) set-aside: 6/30/2012 – 6/29/2022
 NASA SEWP IV Sales Agent
• Sword & Shield Enterprise Security
©2013 Conquest Security, Inc.
All Rights Reserved
2
Our Team
 Government and Commercial Information
Security Experience
 Information Security Engineers
• Certified Information Systems Security
Professional – (CISSP)®
• Certified Ethical Hacker – C|EHTM
• Licensed Penetration Tester – L|PTTM
• Computer Hacking Forensic Investigator – C|
HFITM
©2013 Conquest Security, Inc.
All Rights Reserved
3
What We Do
 Information Security Consulting Services
 Continuous Monitoring & Managed Services
 Training & Educational Services
 Reseller of Industry Leading Solutions
©2013 Conquest Security, Inc.
All Rights Reserved
4
Our Services
 Vulnerability Assessment Services
 Penetration Testing
 Cyber Intelligence Services
 Policy and Procedure Development
 Remediation & Hardening Services
 Cloud Based Vulnerability Assessment Service
©2013 Conquest Security, Inc.
All Rights Reserved
5
Continuous Cyber Security Monitoring
©2013 Conquest Security, Inc.
All Rights Reserved
6
Cyber Intelligence Reports
 Dark Web Monitoring
• Hackers disclose information about
organization’s code, vulnerabilities, and
confidential information
 Know what’s being shared about your
organization and defend against attack.
 Assess external information and
vulnerabilities.
 Remediate and reduce your exposure.
©2013 Conquest Security, Inc.
All Rights Reserved
7
Training
 Instructor-lead Onsite or Online Training
 Customized Scheduling
• Certified Information Systems Security
Professional – (CISSP)®
• Information Security for Systems
Administrators
• Information Security for Software Developers
©2013 Conquest Security, Inc.
All Rights Reserved
8
Cyber 360 Vulnerability Scanning
 Cloud Based Vulnerability Scanning
• Self Service
 No Software to Download
 Fast Cloud Based Scanning
• External and Internal Scanning
 Reports
• Executive and Technical
• HTML, CSV, PDF
©2013 Conquest Security, Inc.
All Rights Reserved
9
Cyber Security Solutions
Next Generation Firewall
Firewall Policy/Configuration Management
Monitoring & Automation
Compliance Automation
Password Auditing and Recovery
©2013 Conquest Security, Inc.
All Rights Reserved
10
Cyber Security Solutions
©2013 Conquest Security, Inc.
All Rights Reserved
11

More Related Content

PDF
Protect your sensitive data against data leaks with Safetica DLP
PPTX
OWASP Nagpur Meet #4
PPTX
CIO's Guide to Enterprise Cloud Adoption
PDF
GPS - Corporate Overview
PDF
Seattle Tech4Good meetup: Data Security and Privacy
PPTX
Understanding Global Data Protection Laws: Webinar
PPTX
Shadow IT: The CISO Perspective on Regaining Control
PPTX
IRDAI Compliance & Data-Centric Security | Seclore
Protect your sensitive data against data leaks with Safetica DLP
OWASP Nagpur Meet #4
CIO's Guide to Enterprise Cloud Adoption
GPS - Corporate Overview
Seattle Tech4Good meetup: Data Security and Privacy
Understanding Global Data Protection Laws: Webinar
Shadow IT: The CISO Perspective on Regaining Control
IRDAI Compliance & Data-Centric Security | Seclore

What's hot (17)

PPTX
Secure Your Web Applications and Achieve Compliance
PPTX
Salesforce Security with Visibility, Control & Data Protection
PDF
Brochure Security
PDF
Protective Monitoring
PPTX
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
PDF
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
PDF
Network as a sensor
PPTX
Sensitive data
DOCX
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PPTX
Not IF, but WHEN
PPTX
CipherCloud for Salesforce - Solution Overview
PDF
DFARS compliance
PPTX
Global Cybersecurity Consulting Firm
PDF
7.Trust Management
PPTX
Webinar: Adaptive Security
PPTX
Compliance regulations with Data Centric Security | Seclore
PDF
ITAR consultant
Secure Your Web Applications and Achieve Compliance
Salesforce Security with Visibility, Control & Data Protection
Brochure Security
Protective Monitoring
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Network as a sensor
Sensitive data
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
Not IF, but WHEN
CipherCloud for Salesforce - Solution Overview
DFARS compliance
Global Cybersecurity Consulting Firm
7.Trust Management
Webinar: Adaptive Security
Compliance regulations with Data Centric Security | Seclore
ITAR consultant
Ad

Viewers also liked (11)

PPTX
InnovIL_716
PDF
Cyber_Services_2015_company_intro_ENG_v2p0
PDF
Marlabs Capabilities Overview: Cyber Security Services
PDF
Marlabs Capabilities Overview: India Professional Services
PPTX
Dekho security overview
PDF
IBM Security Services Overview
PPTX
Cyber Security Needs and Challenges
PDF
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
PPTX
Managed Security Services from Symantec
PDF
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PPTX
Purple team is awesome
InnovIL_716
Cyber_Services_2015_company_intro_ENG_v2p0
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: India Professional Services
Dekho security overview
IBM Security Services Overview
Cyber Security Needs and Challenges
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Managed Security Services from Symantec
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
Purple team is awesome
Ad

Similar to Conquest Security Capabilities (20)

PPT
Conquest capabilities q2 2015 v2
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PDF
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
PDF
Top Security Challenges Facing Credit Unions Today
PDF
ProCern Technology Solutions -Tailored Cyber Health Plans for Comprehensive S...
PDF
CYBER51-FYLER
PPTX
It security cognic_systems
PDF
Cyber Security | Information Security
PPTX
Your cyber security webinar
PPTX
CyberKnight capabilties
PPTX
Your cyber security webinar
PDF
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
PPTX
Cyber Security and its impact -17042025_ppt.pptx
DOCX
Infosecforce security services
PPTX
Scalar Security Roadshow - Vancouver Presentation
PPTX
Scalar Security Roadshow - Calgary Presentation
DOCX
INFOSECFORCE llc security services
PDF
Active security monitoring
PDF
PPTX
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Conquest capabilities q2 2015 v2
Today's Cyber Challenges: Methodology to Secure Your Business
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
Top Security Challenges Facing Credit Unions Today
ProCern Technology Solutions -Tailored Cyber Health Plans for Comprehensive S...
CYBER51-FYLER
It security cognic_systems
Cyber Security | Information Security
Your cyber security webinar
CyberKnight capabilties
Your cyber security webinar
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
Cyber Security and its impact -17042025_ppt.pptx
Infosecforce security services
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Calgary Presentation
INFOSECFORCE llc security services
Active security monitoring
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPT
Teaching material agriculture food technology
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Approach and Philosophy of On baking technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Modernizing your data center with Dell and AMD
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Empathic Computing: Creating Shared Understanding
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Monthly Chronicles - July 2025
Chapter 3 Spatial Domain Image Processing.pdf
Teaching material agriculture food technology
20250228 LYD VKU AI Blended-Learning.pptx
Machine learning based COVID-19 study performance prediction
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Approach and Philosophy of On baking technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Modernizing your data center with Dell and AMD
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Understanding_Digital_Forensics_Presentation.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Network Security Unit 5.pdf for BCA BBA.
Digital-Transformation-Roadmap-for-Companies.pptx
Empathic Computing: Creating Shared Understanding
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication

Conquest Security Capabilities

  • 2. Conquest Security, Inc.  Founded in April, 2005 • Gaithersburg, MD  Government and Commercial Clients in MD, DC, & VA  An SBA 8(a) Certified Business (03/05/2016)  GSA Schedule 70 (GS-35F-0842R)  NITAAC CIO-SP3 (CTA) • BCT Partners • Small Business set-aside: 7/15/2012 – 7/14/2022 • 8(a) set-aside: 6/30/2012 – 6/29/2022  NASA SEWP IV Sales Agent • Sword & Shield Enterprise Security ©2013 Conquest Security, Inc. All Rights Reserved 2
  • 3. Our Team  Government and Commercial Information Security Experience  Information Security Engineers • Certified Information Systems Security Professional – (CISSP)® • Certified Ethical Hacker – C|EHTM • Licensed Penetration Tester – L|PTTM • Computer Hacking Forensic Investigator – C| HFITM ©2013 Conquest Security, Inc. All Rights Reserved 3
  • 4. What We Do  Information Security Consulting Services  Continuous Monitoring & Managed Services  Training & Educational Services  Reseller of Industry Leading Solutions ©2013 Conquest Security, Inc. All Rights Reserved 4
  • 5. Our Services  Vulnerability Assessment Services  Penetration Testing  Cyber Intelligence Services  Policy and Procedure Development  Remediation & Hardening Services  Cloud Based Vulnerability Assessment Service ©2013 Conquest Security, Inc. All Rights Reserved 5
  • 6. Continuous Cyber Security Monitoring ©2013 Conquest Security, Inc. All Rights Reserved 6
  • 7. Cyber Intelligence Reports  Dark Web Monitoring • Hackers disclose information about organization’s code, vulnerabilities, and confidential information  Know what’s being shared about your organization and defend against attack.  Assess external information and vulnerabilities.  Remediate and reduce your exposure. ©2013 Conquest Security, Inc. All Rights Reserved 7
  • 8. Training  Instructor-lead Onsite or Online Training  Customized Scheduling • Certified Information Systems Security Professional – (CISSP)® • Information Security for Systems Administrators • Information Security for Software Developers ©2013 Conquest Security, Inc. All Rights Reserved 8
  • 9. Cyber 360 Vulnerability Scanning  Cloud Based Vulnerability Scanning • Self Service  No Software to Download  Fast Cloud Based Scanning • External and Internal Scanning  Reports • Executive and Technical • HTML, CSV, PDF ©2013 Conquest Security, Inc. All Rights Reserved 9
  • 10. Cyber Security Solutions Next Generation Firewall Firewall Policy/Configuration Management Monitoring & Automation Compliance Automation Password Auditing and Recovery ©2013 Conquest Security, Inc. All Rights Reserved 10
  • 11. Cyber Security Solutions ©2013 Conquest Security, Inc. All Rights Reserved 11