IBSS has been serving the federal government and commercial clients since 1992. We started out as a two-person team trying to make a difference in the world. Since that time, we have grown to more than 200 talented employees with amazing and diverse backgrounds and skills. Our employees have helped us expand our company to include our business lines of Cybersecurity and Enterprise IT; Ocean, Coasts, Climate, Weather, and Satellite; and Professional Services. We place an emphasis on empowering our employees to learn and grow and we believe that collaboration is our key to success. Our robust leadership team and mature management support structure drives our focus on quality, reliability, and innovation.
In addition to our dedicated contract work, it is important to IBSS to be good stewards of the environment and to make a difference in our community. We have an active Volunteer Committee who plans monthly events including park and beach clean ups, school supply drives, toiletries and blankets for the homeless, and educational and training programs to young and aspiring children, teens, and college students. We also have an amazing Cybersecurity Apprenticeship Program that provides a rigorous content-based and hands-on learning experience for aspiring cybersecurity professionals, regardless of their backgrounds, to acquire cybersecurity knowledge and gain experience in cybersecurity disciplines such as engineering, risk management and compliance, security operations, and zero trust (if interested, send an email to info@ibsscorp.com).
Related
NIST SP 800-171 – Defending Against Organizational Risk
Consistent and thorough risk assessments, as outlined in NIST SP 800-171 Section 3.11.1, are paramount for effectively identifying and mitigating risks.
NIST SP 800-171 – Securing Personnel and Information
Adherence to NIST SP 800-171 requirements is not just an option, but an essential mandate.
NIST SP 800-171 – Protecting Information on Digital and Non-Digital Media
The management of CUI on system media is a comprehensive process that involves protection, access control, and sanitization or destruction. Organizations can ensure the confidentiality, integrity, and availability of CUI by implementing effective access control, cryptography, and tracking systems.