{"id":25343,"date":"2020-12-18T20:00:51","date_gmt":"2020-12-18T20:00:51","guid":{"rendered":"https:\/\/host.lalaith.com\/?page_id=25343"},"modified":"2025-02-21T16:20:05","modified_gmt":"2025-02-21T20:20:05","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"25343\" class=\"elementor elementor-25343\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-acb4865 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"acb4865\" data-element_type=\"section\" data-e-type=\"section\">\r\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-thegem\"><div class=\"elementor-row\">\r\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-263fe011\" data-id=\"263fe011\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3ff351c3 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"3ff351c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\tDue to the nature of Federal systems, Agencies require a broad range of cybersecurity services designed to identify, analyze, and eliminate security risks and vulnerabilities before they are exploited. With the continued evolution of technologies and migration towards cloud environments, there is an increased need for an extensive, comprehensive, and cost-effective approach to cybersecurity services. We bring three key aspects to any cybersecurity engagement: senior leadership, lean processes, and cybersecurity expertise. We integrate a highly skilled and lean staff that uses a defined set of security processes in compliance with Federal, NIST, DHS, and DOD policies and guidelines. With experience in cloud-based Zero Trust Architectures and a strong preference for creating defense in depth solutions, we bring needed help to Agencies that need extensive and cost-effective cybersecurity services. <a href=\"https:\/\/www.lalaith.com\/wp-content\/uploads\/LATCH-Corporate-Capabilities-Cyber.pdf\" target=\"_blank\" rel=\"noopener\">Download our cybersecurity capabilities document.<\/a>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-086faf9 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-menu-anchor\" data-id=\"086faf9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"identity-and-access-management\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a27a714 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-invisible elementor-widget elementor-widget-thegem-styled-textbox\" data-id=\"a27a714\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;thegem_elementor_preset&quot;:&quot;basic&quot;}\" data-widget_type=\"thegem-styled-textbox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<div class=\"gem-textbox styled-textbox-basic\">\n\n\t\n\t\t<div class=\"gem-textbox-top gem-textbox-top-none default-fill\">\n\t\t\t\t\t<\/div>\n\t\n\t<div class=\"gem-textbox-inner\">\n\n\t\t<div class=\"gem-textbox-content default-background icon-top gem-textbox-icon-image-wrapping-none\">\n\n\t\t\t\t\t\t\t<div class=\"gem-texbox-icon-image-wrapper\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon-top \">\n\t\t\t\t\t\t\t<div class=\"gem-textbox-icon\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"gem-elegant icon-profile\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<div class=\"gem-texbox-text-wrapper\">\n\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h4 class=\"gem-textbox-title title-h4 bold\">\n\t\t\t\t\t\t\tIdentity and Access Management (IAM)\t\t\t\t\t\t<\/h4>\n\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"gem-textbox-description gem-text-output\">\n\t\t\t\t\t\t\t<p style=\"text-align: left\">Identity and Access Management is the discipline for managing access to enterprise resources and is a critical aspect of any information security program. Compromised user credentials are often an entry point into an organization\u2019s network and its information assets. Identity management safeguards information assets against the rising threats of ransomware, criminal hacking, phishing and other attacks. \u00a0To promote automation within the IT security and access infrastructure that results in efficient, integrated workflows, our services allow organizations to standardize and automate many daily tasks that impose stress, password fatigue, and wasted time on users and administrators.<\/p><h6 style=\"text-align: left\">Identity as a Service<\/h6><p style=\"text-align: left\">We support Identity as a Service (IDaaS) IAM solutions with the\u00a0processes,\u00a0infrastructure,\u00a0and services required to support\u00a0credential management needs specific to each organization\u2019s IT infrastructure goals. Our risk-based approach uses\u00a0a four-step\u00a0process\u00a0with emphasis on\u00a0identity proofing and\u00a0Multi-Factor Authentication (MFA)\u00a0best practices. This provides\u00a0a holistic assessment of users, their\u00a0technical\u00a0environment,\u00a0and the nature\u00a0of\u00a0actions\u00a0they need to complete.\u00a0Our IDaaS solutions can be used with on-premise, cloud, mobile, and internal\/external interfaces.<\/p>\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t<\/div>\n\n\t\n\t\t<div class=\"gem-textbox-bottom gem-textbox-bottom-none default-fill\">\n\t\t\t\t<\/div>\n\t\n\t\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-199aa3a flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-menu-anchor\" data-id=\"199aa3a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"rmf-and-ato-support-services\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73c469e flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-invisible elementor-widget elementor-widget-thegem-styled-textbox\" data-id=\"73c469e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;thegem_elementor_preset&quot;:&quot;basic&quot;}\" data-widget_type=\"thegem-styled-textbox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<div class=\"gem-textbox styled-textbox-basic\">\n\n\t\n\t\t<div class=\"gem-textbox-top gem-textbox-top-none default-fill\">\n\t\t\t\t\t<\/div>\n\t\n\t<div class=\"gem-textbox-inner\">\n\n\t\t<div class=\"gem-textbox-content default-background icon-top gem-textbox-icon-image-wrapping-none\">\n\n\t\t\t\t\t\t\t<div class=\"gem-texbox-icon-image-wrapper\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon-top \">\n\t\t\t\t\t\t\t<div class=\"gem-textbox-icon\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"gem-mdi mdi-marker-check\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<div class=\"gem-texbox-text-wrapper\">\n\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h4 class=\"gem-textbox-title title-h4 bold\">\n\t\t\t\t\t\t\tRMF and ATO Support Services\t\t\t\t\t\t<\/h4>\n\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"gem-textbox-description gem-text-output\">\n\t\t\t\t\t\t\t<p style=\"text-align: left\">Developed by the National Institute of Standards (NIST), the Risk Management Framework (RMF) determines how Federal agencies and contractors protect and secure assets. This framework continues to change and evolve to help organizations improve their security posture on their path to attaining or retaining their Authority to Operate (ATO). Our RMF and ATO support services were designed and are led by experienced, certified cybersecurity experts. We build upon RMF\u2019s six steps (Categorize, Select, Implement, Assess, Authorize, and Monitor) to proactively manage system and data security resulting in RMF compliance and ATO. We use risk-focused tools and processes to identify cyber risks and vulnerabilities across the enterprise.<\/p><p style=\"text-align: left\">Accreditation is sometimes seen as a process that is executed after each release, but RMF awareness informs all parts of our operations cycle. Our Cyber Security Engineers engage with development, O&amp;M, and change management teams, manage security testing tools, and provide response support during security incidents. We update or develop security policy and security documentation through continuous collaboration with technical and functional stakeholders. We support Certification and Accreditation\/Assessment and Authorization (C&amp;A\/A&amp;A) activities by assembling security authorization packages including security plan, security assessment report, and Plan of Action and Milestones (POA&amp;M). Our cybersecurity experts help clients sustain secure and resilient systems by planning, optimizing, and engineering architectures, software, and security tools.<\/p>\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t<\/div>\n\n\t\n\t\t<div class=\"gem-textbox-bottom gem-textbox-bottom-none default-fill\">\n\t\t\t\t<\/div>\n\t\n\t\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fe3c9a flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-menu-anchor\" data-id=\"1fe3c9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"training\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2aa79a flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-invisible elementor-widget elementor-widget-thegem-styled-textbox\" data-id=\"d2aa79a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;thegem_elementor_preset&quot;:&quot;basic&quot;}\" data-widget_type=\"thegem-styled-textbox.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<div class=\"gem-textbox styled-textbox-basic\">\n\n\t\n\t\t<div class=\"gem-textbox-top gem-textbox-top-none default-fill\">\n\t\t\t\t\t<\/div>\n\t\n\t<div class=\"gem-textbox-inner\">\n\n\t\t<div class=\"gem-textbox-content default-background icon-top gem-textbox-icon-image-wrapping-none\">\n\n\t\t\t\t\t\t\t<div class=\"gem-texbox-icon-image-wrapper\">\n\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon-top \">\n\t\t\t\t\t\t\t<div class=\"gem-textbox-icon\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chalkboard-teacher\"><\/i>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<div class=\"gem-texbox-text-wrapper\">\n\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h4 class=\"gem-textbox-title title-h4 bold\">\n\t\t\t\t\t\t\tTraining\t\t\t\t\t\t<\/h4>\n\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"gem-textbox-description gem-text-output\">\n\t\t\t\t\t\t\t<p style=\"text-align: left\">While there are many highly technical aspects to cybersecurity, an organization\u2019s employees remain the first line of defense in protecting information assets and data. Our cybersecurity training support services use the Agile ADDIE model of training development to rapidly iterate and prototype cybersecurity training tailored for the different cybersecurity roles such as system owner, Contracting Officer, and Representative (COR). We conduct extensive data collection that includes task observation, technical document research, and direct collaboration with SMEs for all cybersecurity roles. We design innovative and creative instructional content using adult learning theory to address how adults learn. This includes an emphasis on self-direction, incorporating experiences, and providing a motivational element to encourage engagement, comprehension, and retention.<span style=\"text-align: center\"><\/span><\/p>\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t<\/div>\n\n\t\n\t\t<div class=\"gem-textbox-bottom gem-textbox-bottom-none default-fill\">\n\t\t\t\t<\/div>\n\t\n\t\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b37aaf0 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"b37aaf0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"gem-mdi mdi-security\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tShaping a Solid Cybersecurity Solution\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tThere's a common adage in the cybersecurity world: compliance is not security. Achieving the ATO is just the first milestone to protecting your system from hostile actors. To discover more about our defense in depth and zero trust architecture solutions, <b>schedule a session<\/b> with our cybersecurity experts.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec6cc59 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-contact-form7\" data-id=\"ec6cc59\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;thegem_elementor_preset&quot;:&quot;default&quot;}\" data-widget_type=\"thegem-contact-form7.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f26472-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"26472\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/index.php\/wp-json\/wp\/v2\/pages\/25343#wpcf7-f26472-o1\" method=\"post\" class=\"wpcf7-form init thegem-cf7 form-ec6cc59 label-top\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><legend class=\"screen-reader-text\">Hidden fields<\/legend><input type=\"hidden\" name=\"_wpcf7\" value=\"26472\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f26472-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<div class=\"row\">\n<div class=\"form-line col-lg-4 col-md-6 col-xs-12\"><div class=\"gem-form-icon-name\"><span class=\"wpcf7-form-control-wrap\" data-name=\"client-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Name\" value=\"\" type=\"text\" name=\"client-name\" \/><\/span><\/div><\/div>\n<div class=\"form-line col-lg-4 col-md-6 col-xs-12\"><div class=\"gem-form-icon-email\"><span class=\"wpcf7-form-control-wrap\" data-name=\"client-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email\" value=\"\" type=\"email\" name=\"client-email\" \/><\/span><\/div><\/div>\n<div class=\"form-line col-lg-4 col-md-12 col-xs-12\"><span class=\"wpcf7-form-control-wrap\" data-name=\"request-topic\"><select class=\"wpcf7-form-control wpcf7-select gem-combox\" aria-invalid=\"false\" name=\"request-topic\"><option value=\"Select Your Interest\">Select Your Interest<\/option><option value=\"Cloud Services\">Cloud Services<\/option><option value=\"Cloud Service - Financial Planning\">Cloud Service - Financial Planning<\/option><option value=\"Cloud Service - Readiness Assessment\">Cloud Service - Readiness Assessment<\/option><option value=\"Cloud Service - Migration\">Cloud Service - Migration<\/option><option value=\"Cloud Service - Operations and Maintenance\">Cloud Service - Operations and Maintenance<\/option><option value=\"Cloud Solution - Cloud Migration Plan\">Cloud Solution - Cloud Migration Plan<\/option><option value=\"Cybersecurity\">Cybersecurity<\/option><option value=\"Cybersecurity - Identity and Access Management\">Cybersecurity - Identity and Access Management<\/option><option value=\"Cybersecurity - RMF and ATO Support Services\">Cybersecurity - RMF and ATO Support Services<\/option><option value=\"Cybersecurity - Training\">Cybersecurity - Training<\/option><option value=\"Program and Project Management\">Program and Project Management<\/option><option value=\"Program and Project Management - Portfolio and Program Management\">Program and Project Management - Portfolio and Program Management<\/option><option value=\"Program and Project Management - Risk Management\">Program and Project Management - Risk Management<\/option><option value=\"Program and Project Management - Transition Management\">Program and Project Management - Transition Management<\/option><option value=\"Program and Project Management - Stakeholder Engagement and Alignment\">Program and Project Management - Stakeholder Engagement and Alignment<\/option><option value=\"Program and Project Management Solution - SAFe DevSecOps Playbook\">Program and Project Management Solution - SAFe DevSecOps Playbook<\/option><option value=\"Software Development\">Software Development<\/option><option value=\"Software Development - Continuous Delivery Pipeline\">Software Development - Continuous Delivery Pipeline<\/option><option value=\"Software Development - UX Research and Design\">Software Development - UX Research and Design<\/option><option value=\"Software Development Solution - Google Design Sprint\">Software Development Solution - Google Design Sprint<\/option><option value=\"Software Development Solution - SAFe DevSecOps Playbook\">Software Development Solution - SAFe DevSecOps Playbook<\/option><option value=\"The Lalaith Astor Company\">The Lalaith Astor Company<\/option><option value=\"Something Else\">Something Else<\/option><\/select><\/span><\/div>\n<div class=\"col-lg-12 col-md-12 col-xs-12\"><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Get in Touch\" \/><\/div>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div><\/div>\r\n\t\t<\/section>\r\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Due to the nature of Federal systems, Agencies require a broad range of cybersecurity services designed to identify, analyze, and&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":24153,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-25343","page","type-page","status-publish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity - Lalaith Astor Technical Consulting House<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity - Lalaith Astor Technical Consulting House\" \/>\n<meta property=\"og:description\" content=\"Due to the nature of Federal systems, Agencies require a broad range of cybersecurity services designed to identify, analyze, and...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Lalaith Astor Technical Consulting House\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-21T20:20:05+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/\",\"url\":\"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/\",\"name\":\"Cybersecurity - Lalaith Astor Technical Consulting House\",\"isPartOf\":{\"@id\":\"https:\/\/www.lalaith.com\/#website\"},\"datePublished\":\"2020-12-18T20:00:51+00:00\",\"dateModified\":\"2025-02-21T20:20:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.lalaith.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Our Capabilities\",\"item\":\"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lalaith.com\/#website\",\"url\":\"https:\/\/www.lalaith.com\/\",\"name\":\"Lalaith Astor Technical Consulting House\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.lalaith.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lalaith.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.lalaith.com\/#organization\",\"name\":\"Lalaith Astor Technical Consulting House\",\"url\":\"https:\/\/www.lalaith.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.lalaith.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.lalaith.com\/wp-content\/uploads\/latch-stacked-492x492-1.png\",\"contentUrl\":\"https:\/\/www.lalaith.com\/wp-content\/uploads\/latch-stacked-492x492-1.png\",\"width\":492,\"height\":492,\"caption\":\"Lalaith Astor Technical Consulting House\"},\"image\":{\"@id\":\"https:\/\/www.lalaith.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/lalaith-astor-technical-consulting-house\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity - Lalaith Astor Technical Consulting House","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity - Lalaith Astor Technical Consulting House","og_description":"Due to the nature of Federal systems, Agencies require a broad range of cybersecurity services designed to identify, analyze, and...","og_url":"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/","og_site_name":"Lalaith Astor Technical Consulting House","article_modified_time":"2025-02-21T20:20:05+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/","url":"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/","name":"Cybersecurity - Lalaith Astor Technical Consulting House","isPartOf":{"@id":"https:\/\/www.lalaith.com\/#website"},"datePublished":"2020-12-18T20:00:51+00:00","dateModified":"2025-02-21T20:20:05+00:00","breadcrumb":{"@id":"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.lalaith.com\/"},{"@type":"ListItem","position":2,"name":"Our Capabilities","item":"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.lalaith.com\/#website","url":"https:\/\/www.lalaith.com\/","name":"Lalaith Astor Technical Consulting House","description":"","publisher":{"@id":"https:\/\/www.lalaith.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lalaith.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.lalaith.com\/#organization","name":"Lalaith Astor Technical Consulting House","url":"https:\/\/www.lalaith.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.lalaith.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.lalaith.com\/wp-content\/uploads\/latch-stacked-492x492-1.png","contentUrl":"https:\/\/www.lalaith.com\/wp-content\/uploads\/latch-stacked-492x492-1.png","width":492,"height":492,"caption":"Lalaith Astor Technical Consulting House"},"image":{"@id":"https:\/\/www.lalaith.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/lalaith-astor-technical-consulting-house"]}]}},"_links":{"self":[{"href":"https:\/\/www.lalaith.com\/index.php\/wp-json\/wp\/v2\/pages\/25343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lalaith.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.lalaith.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.lalaith.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lalaith.com\/index.php\/wp-json\/wp\/v2\/comments?post=25343"}],"version-history":[{"count":80,"href":"https:\/\/www.lalaith.com\/index.php\/wp-json\/wp\/v2\/pages\/25343\/revisions"}],"predecessor-version":[{"id":33131,"href":"https:\/\/www.lalaith.com\/index.php\/wp-json\/wp\/v2\/pages\/25343\/revisions\/33131"}],"up":[{"embeddable":true,"href":"https:\/\/www.lalaith.com\/index.php\/wp-json\/wp\/v2\/pages\/24153"}],"wp:attachment":[{"href":"https:\/\/www.lalaith.com\/index.php\/wp-json\/wp\/v2\/media?parent=25343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}