Information Technology

Cybersecurity

Cybersecurity and information assurance is one of the primary lines of business for FMS. Our portfolio covers the full spectrum of information security needs of our clients. We are currently supporting a number of US federal government agencies with their information security objectives. Our solutions for strengthening organizations’ data, information systems, and network operations help them manage the information security risks and comply with various statutory/regulatory requirements. Our clients rely on our deep experience in tools and techniques to accurately assess their current maturity levels and implement metrics-based solutions that will measurably improve the overall security posture.

Our expertise includes:

  • CISO advisory and cybersecurity governance
  • Security architecture and engineering
  • Identity and Access Management (IdAM)
  • Continuous Diagnostics and Mitigation (CDM)
  • Cloud Security and FedRAMP
  • Continuous monitoring tools and NIST compliance
  • Critical infrastructure protection and computer network operations
  • Assessment and Authorization (A&A), Authority To Operate (ATO)
  • Computer Forensics PKI and cryptographic planning and implementation
  • FISMA program support initiation, certification, accreditation, and monitoring
  • Risk management framework and POAMs management
  • Policy and IT security control development
  • Cybersecurity training and awareness
  • Vulnerability assessment and incident management
  • Disaster recovery and continuity of operations

IT Modernization and Legacy Systems Transition

The significance of Information Technology (IT) is constantly increasing in every organization to serve the mission, achieve business goals, maximize efficiencies, and optimize resources. Business needs and technology advances are inextricably linked. Keeping pace with the emerging technology landscape can be difficult for even the most tech-savvy leaders. We can help with end-to-end IT modernization services and solutions. Our technology professionals have deep experience applying technologies to help you achieve your business goals.

Legacy systems are expensive to maintain and complex to modify. They make it hard to stay ahead of changing market needs, given how long it takes to develop and release new functionality. So, legacy systems may be limiting your ability to roll out new competitive features or service offerings, and they are also limiting the ability to compete on cost. The key question for executives: how to offer the best services to the business and customers at the lowest cost? To stay competitive, this will invariably mean that they will selectively decommission legacy systems and integration infrastructure. They will also need to develop new capabilities that run in parallel. Our proven model focuses on six fundamental priorities to deal with this transition:

  1. Proactively managing risk
  2. Customer-centric business model
  3. Optimized distribution
  4. Simplified business and operating model
  5. Obtaining an information advantage
  6. Enabling innovation

Our past performance includes:

  • IT modernization & legacy system transition
  • Legacy systems decommissioning process and implementation
  • Enterprise architecture and alignment
  • Concept of operations and disaster recovery
  • Mobility and digital government
  • Feasibility studies and proof of concept
  • System development life cycle support
  • Requirements management, business analysis, and traceability matrices
  • Application development and software engineering
  • Enterprise SharePoint support
  • QA, testing services and Independent Verification and Validation (IV&V)
  • Web and mobile development
  • Cloud services and Big Data solutions
  • Integration and COTS implementation
  • Operations and maintenance

Change Management

Change management performed over a system’s life cycle provides control of performance and functionality to ensure the system performs as designed and intended. It also provides the documentation required to track and control changes for both reporting and future change purposes. Change at any level of an organization involves risk that must be understood and effectively controlled and managed for the organization to be successful. Strict change control and change management processes and procedures can help ensure successful and predictable outcomes. 

Our organizational change management methodology provides a framework and methodical process for how to engage stakeholders, shift mindsets and behaviors, and ultimately engender personal commitment to the change. Our approach is built on a common set of theories and principles regarding organizational change, complemented with institutional and professional experience from assisting organizations with transformation efforts. Our approach uses three phases that help organizations effectively perform the following tasks:

  1. Prepare and plan for change
  2. Manage the change
  3. Sustain and improve

The changes we have helped implement have improved communications efforts, streamlined purchasing processes, improved employee engagement, enhanced governance, and lowered operating costs. When performed properly, change management can result in future cost avoidance.