G2 Ops Blog:

Stories from our team.

G2 Ops Blog:

Stories from our team.
07
May

Speed to Capability versus Accreditation

The current method of assessing Cybersecurity risk of operation for Department of Defense (DOD) does not meet the Warfighters need to quickly employ state-of-the-art Technology solutions in tactical systems. Service Chiefs strive to provide new capabilities to the warfighter at a rapid rate.  This is sometimes referred to as “Speed to Capability.” Service Chiefs also have a responsibility to ensure that all Information Systems (IS) are resilient against Cyber attackers.  This defense is intended to...
Read More
27
Feb

A look inside…. G2 Ops Information Technology Department

When we think about creating an environment to support and manage our company assets, we look at three critical factors; 1. Ability to adapt to our environment and client needs, 2. Agility in incorporating changes for continuous improvement, and 3. Keep the bigger picture in mind so we can anticipate and evaluate any risks.  As a leader in providing consulting to other companies on protecting their assets, we want to share some of the tools...
Read More
Dan Williams, Chief Architect, G2 Ops
24
Jan

What is Model-Based Systems Engineering (MBSE)?

In exact terms, Model-Based Systems Engineering is a formalized application of modeling to support system requirements, design, analysis, verification and validation activities beginning in the conceptual design phase and continuing throughout development and later life cycle phases. In our words and why it has helped us support our clients for the last 10 years; it is a way to capture and relate design data like Architecture Diagrams, Component Properties, Critical Process Flows, and Requirements into...
Read More
18
Dec

Why Pursue a Career in Cybersecurity?

The Bureau of Labor and Statistics estimates the demand for information security analysts will grow 28% between the years 2016 and 2026, which is faster growth than most other professions. Some of the reasons for this growth is because cybersecurity attacks continue to be more prevalent and attackers tend to be more and more sophisticated in their approach to stealing information. Even more notable is the growth of employment of information security professionals to 56%...
Read More
1 9 10 11 12 13 15