top of page
  • LAIKA CONSUTLTING CO. (7)
  • LAIKA CONSUTLTING CO. (8)
  • LAIKA CONSUTLTING CO. (6)

Cybersecurity Solutions to Complete the Mission

Laika Consulting Co. understands the importance of protecting your valuable assets and information. That's why we offer a wide range of comprehensive services to help safeguard your business from cyber threats. Our team of experienced and certified professionals are dedicated to providing the most effective and innovative solutions to keep your data and systems secure.

risk managemnt

Risk Management Framework (RMF) Development & Management

  • Policy and procedure development tailored to your program requirements.

  • Insider Threat program development

  • Start to Finish RMF Implementation

  • Continuous monitoring

  • Custom System Security Plan (SSP) development

  • EMASS management

  • Risk assessments

sca

Security Compliance Analysis (SCA) Independent Assessments for RMF Compliance

  • Risk assessment of current and potential security posture

  • Vulnerability assessments with industry standard tools

  • Compliance assessments

nist

NIST 800-171/DFARS Compliance Assessments (CMMC)

  • Evaluation utilizing the official NIST assessment guidance and procedures

  • Documentation and Policy Overview with Security Control Mapping

  • Technical Evaluation of Systems and Network

  • Executive Summary Report and Corrective Action Plan

  • Department of Defense 8570/8410 Certified

isso

On-Demand Information System Security Officer (ISSO)

  • Cost effective solutions for small/medium cyber businesses

  • Weekly auditing requirements

  • Risk Management Framework package maintenance

  • Develop and implement personnel required training

  • RMF security control implementation and verification

  • Policy and procedure development (contingency plans, configuration management plans, POA&Ms, etc)

  • Provide technical input during design and implementation of secure systems

cybersecurity

Cybersecurity Engineering | Secure Network | System Development

  • Secure system development

  • Security Development Operations

  • Network and boundary security development

  • Endpoint security development and implementation

bottom of page