SlideShare a Scribd company logo
Mission Critical Global
Technology Group
Enterprise Security Risk Management
(ESRM)
About Us
MCGlobalTech
– Mission Critical Global Technology Group (MCGlobalTech) is
a minority owned, small business founded by industry
leaders to provide strategic advisory and security consulting
services to public and private sector business managers to
better align technology and security programs with
organizational mission and business goals.
– The Principals at MCGlobalTech have been providing
Information Security services to the Federal Government
and the private sector for over 25 years
Our Values
At MCGlobalTech, we believe that strong values create
long term relationships with our customers,
employees, partners and the communities we serve.
At the heart of everything we do, our corporate values
are:
– Providing customer satisfaction
– Delivering innovative solutions
– Empowering staff for success
– Promoting Entrepreneurial spirit
– Maintaining technical excellence
Staff
Skills
Success
What we offer
MCGlobalTech is able to provide our customers with
innovative, mission-critical solutions in a broad variety
of technologies. We consider the following our core
competencies:
– Information Assurance (Security Authorization)
– Vulnerability Management
– Security Risk Management
– Security Engineering
– Penetration Testing
– Network Security
Enterprise Security Risk Management
Our framework for providing our security services
is encompassed in our Enterprise Security Risk
Management solution (ESRM). The ESRM
framework provides full life-cycle security support
to ensure that federal agencies and commercial
customers meet their regulatory and business
security requirements.
ESRM Full Life-Cycle Security
Security
Requirements
Definition
Security Design
and Engineering
Security Test,
Validation and
Reporting
Security
Documentation
and Response
ESRM Full Life-Cycle Security
Security Requirements Definition
– This phase of the life cycle defines the security
management, operational and technical
requirements for the system.
– The MCGlobalTech engineers will define the
requirements of the system in accordance with the
applicable government or commercial regulation
(FISMA, ISO, CoBit, etc.). This is the foundation of
the system and it will impact its design, hardware,
software, performance, security and reliability.
ESRM Full Life-Cycle Security
Security Design and Engineering
– Focusing on the security aspects in the design, the
system must be able to deal robustly with possible
sources of disruption, ranging from natural disasters
to malicious acts.
– The MCGlobalTech engineers will provide security
support to include security architecture design,
security control identification and implementation
and security risk analysis and assessment.
ESRM Full Life-Cycle Security
Security Test, Validation and Reporting
– MCGlobalTech offers a full range of system testing
to include security controls testing, application
testing, vulnerability testing and penetration
testing. These test are performed in accordance
with government or commercial regulations and
guidelines.
– MCGlobalTech also offers Independent Validation
and Verification (IV&V) testing to ensure that the
system meets the defined security requirements.
ESRM Full Life-Cycle Security
Security Documentation and Response
– During the operational phase of the system the
MCGlobalTech consultants will create and/or
finalize the system security documentation to
include security design, security plans, risk
assessments, etc.
– MCGlobalTech can provide support for forensic
analysis and incident response in cases of system
breach. MCGlobaltech can also implement its
Security Continuous Monitoring program to
ensure system confidentiality, reliability and
security.
Security Continuous Monitoring
Our primary service offering within ESRM is our
Security Continuous Monitoring (SCM) program.
MCGlobalTech’s SCM program is designed to help
federal agencies and commercial clients meet existing
government regulations, respond to both internal and
external audits and existing and new security threats
and vulnerabilities.
SCM
Internal &
External Audits
Federal
Guidelines and
Directives
Threats and
Vulnerabilities
Security Continuous Monitoring
The SCM program is designed to review the security
of an organization’s IT infrastructure on a recurring
basis. The program is intended to measure an
organization’s security posture over time. This will
allow management to understand whether the
security of the network is improving or declining and
determine what areas to focus available resources.
Baseline
Assessment
Monthly/Quarterly
Checks
Full
Assessment
Malicious Code Hackers
Security Continuous Monitoring
SCM Compliance Scope
Maintain security documentation
Perform vulnerability assessment
Perform security controls testing
Enforce policy through internal reporting
Track and update system weaknesses
Educate and train users and system administrators
Monitor changes throughout environment
Security Continuous Monitoring
SCM Compliance Schedule
Enterprise Compliance Schedule
Monthly  Conduct Security Controls Testing
 Ensure Patch Management Compliance
 Update Policies and Procedures
 Findings tracking and reporting
Quarterly  Policy compliance auditing
 Incremental Vulnerability Assessments
 POA&M updating and reporting
Annually/
Continuous
 System Security Plan & Risk Assessment Update
 Perform Penetration Testing
 Providing Information Security Training
 Monitor Changes throughout the Environment
Past Performance
MCGlobalTech’s Principals have worked for and with large
contracting and consulting firms. They have provided security
expertise throughout the federal government including the
Department of Defense, Intelligence and Federal Civilian
Agencies. They have also provided security services to large
financial, healthcare and various commercial organizations
throughout the country. A list of federal and commercial
clients along with the specific security services performed is
listed in the following tables.
Past Performance (Federal)
Clients
Information
Assurance
Vulnerability
Management
Security Risk
Management
Security Engineering Penetration Testing
Network
Security
DHS ● ● ● ● ● ●
DOL ● ● ● ●
IRS ● ● ● ●
NASA ● ● ●
DOT ● ● ●
DOD ● ● ● ● ●
FBI ● ●
VA ● ●
USAID ● ● ●
Past Performance (Commercial)
Clients
Security Program
Management
Security Risk
Management
Security Engineering Penetration Testing
Vulnerability
Management
FISERV ● ● ● ●
Verisign ● ●
CarMax ● ●
Freddie Mac ●
Booz Allen ● ● ● ● ●
Hawaiian Healthcare ● ●
Bancroft ● ●
Lydall ● ●
IBM ● ●
Walgreens ● ●
Contact Us
Mission Critical Global Technology Group
1325 G Street, NW
Suite 500
Washington, District of Columbia 20005
Phone: 202.355.9448
Email: Info@mcglobaltech.com
Eugene E. Dorns Morris Cody
Managing Principal Managing Principal
edorns@mcglobaltech.com mcody@mcglobaltech.com
(202) 355-9448 x102 (202) 355-9448 x100
(703) 868-1873 (cell) (302) 740-2022 (cell)

More Related Content

PPTX
Cybersecurity Audit
PPT
Securitymetrics
PDF
The Demystification of successful cybersecurity initiatives.
PPTX
Managing Security Risks in Manufacturing
DOCX
Generic_Sample_INFOSECPolicy_and_Procedures
PPTX
MCGlobalTech Service Presentation
PDF
Metric stream elevating your compliance program with technology
PDF
Five principles for improving your cyber security
Cybersecurity Audit
Securitymetrics
The Demystification of successful cybersecurity initiatives.
Managing Security Risks in Manufacturing
Generic_Sample_INFOSECPolicy_and_Procedures
MCGlobalTech Service Presentation
Metric stream elevating your compliance program with technology
Five principles for improving your cyber security

What's hot (20)

PPTX
Its time to rethink everything a governance risk compliance primer
PDF
IT Security and Risk Management - Visionet Systems
PPT
Security policy
PPTX
Enterprise IT Security Audit | Cyber Security Services
PDF
Sivasankaran_9yrs_Information_security V1
PPTX
Health IT Cyber Security HIPAA Summit Presentation: Metrics and Continuous Mo...
PDF
Strategy Insights - How to Quantify IT Risks
PPTX
Information Security Management
PDF
Business case for information security program
PDF
IT SECURITY ASSESSMENT PROPOSAL
PPTX
Security and Compliance Initial Roadmap
PDF
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
PDF
It Security Audit Process
PDF
RiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPA
PDF
The impact of GDPR on UK employers
PDF
Information Security Risk Management Overview
PPTX
2017 WHD - Bridging the Divide Between Behavior and Security
PDF
The importance of information security risk management
PDF
Nist.sp.800 37r2
DOC
Redspin HIPAA Security Risk Analysis RFP Template
Its time to rethink everything a governance risk compliance primer
IT Security and Risk Management - Visionet Systems
Security policy
Enterprise IT Security Audit | Cyber Security Services
Sivasankaran_9yrs_Information_security V1
Health IT Cyber Security HIPAA Summit Presentation: Metrics and Continuous Mo...
Strategy Insights - How to Quantify IT Risks
Information Security Management
Business case for information security program
IT SECURITY ASSESSMENT PROPOSAL
Security and Compliance Initial Roadmap
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
It Security Audit Process
RiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPA
The impact of GDPR on UK employers
Information Security Risk Management Overview
2017 WHD - Bridging the Divide Between Behavior and Security
The importance of information security risk management
Nist.sp.800 37r2
Redspin HIPAA Security Risk Analysis RFP Template
Ad

Similar to MCGlobalTech Enterprise Risk Management Program (20)

PDF
MCGlobalTech Cyber Capability Statement
PDF
MCGlobalTech Cyber Capability Statement_Final
PDF
MCGlobalTech Commercial Cybersecurity Capability Statement
PDF
MCGlobalTech Managed Security Compliance Program
PDF
MCG_OnePageBrochure_Final
PDF
MCG_OnePageBrochure
PDF
MCGlobalTech_Commercial_statement
PDF
MCGlobalTech Capability Statement
PPTX
MCGlobalTech Consulting Service Presentation
PPTX
"Navigate the MDR Marketplace Like a Pro!"
PPTX
ITExpertUS Corporate (CyberSecurity) 2023.pptx
PDF
Ooredoo%20Security%20Managed%20Services
PPTX
Institute of Internal Auditors Presentation 2014
PDF
Securing Your Business: A Comprehensive Guide to Managed Security Services
PDF
Cyber Security | Information Security
DOCX
Infosecforce security services
PDF
Active security monitoring
PPTX
Iso27001 Audit Services
DOCX
INFOSECFORCE llc security services
PDF
第7回VEC制御システムサイバーセキュリティカンファレンス
MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Managed Security Compliance Program
MCG_OnePageBrochure_Final
MCG_OnePageBrochure
MCGlobalTech_Commercial_statement
MCGlobalTech Capability Statement
MCGlobalTech Consulting Service Presentation
"Navigate the MDR Marketplace Like a Pro!"
ITExpertUS Corporate (CyberSecurity) 2023.pptx
Ooredoo%20Security%20Managed%20Services
Institute of Internal Auditors Presentation 2014
Securing Your Business: A Comprehensive Guide to Managed Security Services
Cyber Security | Information Security
Infosecforce security services
Active security monitoring
Iso27001 Audit Services
INFOSECFORCE llc security services
第7回VEC制御システムサイバーセキュリティカンファレンス
Ad

More from William McBorrough (13)

PPTX
MCGlobalTech CMMC Managed Compliance Service
PPTX
Cybersecurity Career Information by Next Gen Cyber
PDF
Improving Cyber Readiness with the NIST Cybersecurity Framework
PPTX
MCG Cybersecurity Webinar Series - Risk Management
PPTX
MCG Cybersecurity Webinar Series - Risk Management
PDF
Information Security Continuous Monitoring within a Risk Management Framework
PPTX
Cyber Crime Threat Landscape - A Focus on the Financial Industry
PPT
Protecting Customer Confidential Information
PPTX
Need for Improved Critical Industrial Infrastructure Protection
PDF
Need for Improved Critical Industrial Infrastructure Protection
PDF
No National 'Stand Your Cyberground' Law Please
PDF
FCC Report on Google Street View Wi-Fi Data Snooping
PPT
Cloud Computing - Security Benefits and Risks
MCGlobalTech CMMC Managed Compliance Service
Cybersecurity Career Information by Next Gen Cyber
Improving Cyber Readiness with the NIST Cybersecurity Framework
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
Information Security Continuous Monitoring within a Risk Management Framework
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Protecting Customer Confidential Information
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
No National 'Stand Your Cyberground' Law Please
FCC Report on Google Street View Wi-Fi Data Snooping
Cloud Computing - Security Benefits and Risks

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Empathic Computing: Creating Shared Understanding
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
Teaching material agriculture food technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Big Data Technologies - Introduction.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Approach and Philosophy of On baking technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Network Security Unit 5.pdf for BCA BBA.
Encapsulation theory and applications.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Empathic Computing: Creating Shared Understanding
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
“AI and Expert System Decision Support & Business Intelligence Systems”
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Teaching material agriculture food technology
Advanced methodologies resolving dimensionality complications for autism neur...
NewMind AI Monthly Chronicles - July 2025
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Big Data Technologies - Introduction.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Approach and Philosophy of On baking technology
Understanding_Digital_Forensics_Presentation.pptx
Machine learning based COVID-19 study performance prediction
Network Security Unit 5.pdf for BCA BBA.

MCGlobalTech Enterprise Risk Management Program

  • 1. Mission Critical Global Technology Group Enterprise Security Risk Management (ESRM)
  • 2. About Us MCGlobalTech – Mission Critical Global Technology Group (MCGlobalTech) is a minority owned, small business founded by industry leaders to provide strategic advisory and security consulting services to public and private sector business managers to better align technology and security programs with organizational mission and business goals. – The Principals at MCGlobalTech have been providing Information Security services to the Federal Government and the private sector for over 25 years
  • 3. Our Values At MCGlobalTech, we believe that strong values create long term relationships with our customers, employees, partners and the communities we serve. At the heart of everything we do, our corporate values are: – Providing customer satisfaction – Delivering innovative solutions – Empowering staff for success – Promoting Entrepreneurial spirit – Maintaining technical excellence Staff Skills Success
  • 4. What we offer MCGlobalTech is able to provide our customers with innovative, mission-critical solutions in a broad variety of technologies. We consider the following our core competencies: – Information Assurance (Security Authorization) – Vulnerability Management – Security Risk Management – Security Engineering – Penetration Testing – Network Security
  • 5. Enterprise Security Risk Management Our framework for providing our security services is encompassed in our Enterprise Security Risk Management solution (ESRM). The ESRM framework provides full life-cycle security support to ensure that federal agencies and commercial customers meet their regulatory and business security requirements.
  • 6. ESRM Full Life-Cycle Security Security Requirements Definition Security Design and Engineering Security Test, Validation and Reporting Security Documentation and Response
  • 7. ESRM Full Life-Cycle Security Security Requirements Definition – This phase of the life cycle defines the security management, operational and technical requirements for the system. – The MCGlobalTech engineers will define the requirements of the system in accordance with the applicable government or commercial regulation (FISMA, ISO, CoBit, etc.). This is the foundation of the system and it will impact its design, hardware, software, performance, security and reliability.
  • 8. ESRM Full Life-Cycle Security Security Design and Engineering – Focusing on the security aspects in the design, the system must be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. – The MCGlobalTech engineers will provide security support to include security architecture design, security control identification and implementation and security risk analysis and assessment.
  • 9. ESRM Full Life-Cycle Security Security Test, Validation and Reporting – MCGlobalTech offers a full range of system testing to include security controls testing, application testing, vulnerability testing and penetration testing. These test are performed in accordance with government or commercial regulations and guidelines. – MCGlobalTech also offers Independent Validation and Verification (IV&V) testing to ensure that the system meets the defined security requirements.
  • 10. ESRM Full Life-Cycle Security Security Documentation and Response – During the operational phase of the system the MCGlobalTech consultants will create and/or finalize the system security documentation to include security design, security plans, risk assessments, etc. – MCGlobalTech can provide support for forensic analysis and incident response in cases of system breach. MCGlobaltech can also implement its Security Continuous Monitoring program to ensure system confidentiality, reliability and security.
  • 11. Security Continuous Monitoring Our primary service offering within ESRM is our Security Continuous Monitoring (SCM) program. MCGlobalTech’s SCM program is designed to help federal agencies and commercial clients meet existing government regulations, respond to both internal and external audits and existing and new security threats and vulnerabilities. SCM Internal & External Audits Federal Guidelines and Directives Threats and Vulnerabilities
  • 12. Security Continuous Monitoring The SCM program is designed to review the security of an organization’s IT infrastructure on a recurring basis. The program is intended to measure an organization’s security posture over time. This will allow management to understand whether the security of the network is improving or declining and determine what areas to focus available resources. Baseline Assessment Monthly/Quarterly Checks Full Assessment Malicious Code Hackers
  • 13. Security Continuous Monitoring SCM Compliance Scope Maintain security documentation Perform vulnerability assessment Perform security controls testing Enforce policy through internal reporting Track and update system weaknesses Educate and train users and system administrators Monitor changes throughout environment
  • 14. Security Continuous Monitoring SCM Compliance Schedule Enterprise Compliance Schedule Monthly  Conduct Security Controls Testing  Ensure Patch Management Compliance  Update Policies and Procedures  Findings tracking and reporting Quarterly  Policy compliance auditing  Incremental Vulnerability Assessments  POA&M updating and reporting Annually/ Continuous  System Security Plan & Risk Assessment Update  Perform Penetration Testing  Providing Information Security Training  Monitor Changes throughout the Environment
  • 15. Past Performance MCGlobalTech’s Principals have worked for and with large contracting and consulting firms. They have provided security expertise throughout the federal government including the Department of Defense, Intelligence and Federal Civilian Agencies. They have also provided security services to large financial, healthcare and various commercial organizations throughout the country. A list of federal and commercial clients along with the specific security services performed is listed in the following tables.
  • 16. Past Performance (Federal) Clients Information Assurance Vulnerability Management Security Risk Management Security Engineering Penetration Testing Network Security DHS ● ● ● ● ● ● DOL ● ● ● ● IRS ● ● ● ● NASA ● ● ● DOT ● ● ● DOD ● ● ● ● ● FBI ● ● VA ● ● USAID ● ● ●
  • 17. Past Performance (Commercial) Clients Security Program Management Security Risk Management Security Engineering Penetration Testing Vulnerability Management FISERV ● ● ● ● Verisign ● ● CarMax ● ● Freddie Mac ● Booz Allen ● ● ● ● ● Hawaiian Healthcare ● ● Bancroft ● ● Lydall ● ● IBM ● ● Walgreens ● ●
  • 18. Contact Us Mission Critical Global Technology Group 1325 G Street, NW Suite 500 Washington, District of Columbia 20005 Phone: 202.355.9448 Email: Info@mcglobaltech.com Eugene E. Dorns Morris Cody Managing Principal Managing Principal edorns@mcglobaltech.com mcody@mcglobaltech.com (202) 355-9448 x102 (202) 355-9448 x100 (703) 868-1873 (cell) (302) 740-2022 (cell)