Skip to main content

Cybersecurity

Delivering Critical Services and Experts

Deploying Innovative, Mission-focused, and Customer-driven solutions to solve the latest threats in an ever-evolving threat landscape.

We provide holistic solutions that flex based on the services and personnel needed to accomplish and continuously support the end-state of our clients.

Ataqan Cyber™

Our premier offering serving your security and privacy needs.

Ataqan Cyber™ is a repeatable cybersecurity offering that can be tailored to your mission needs while leveraging industry standards, subject matter expertise, and past performance proven experience protecting you and your organization. We are proud to provide this offering and its five core modules as an answer to the continued need to defend against the various adversaries that persist, while pushing innovation by dynamically changing the platform to protect against threats, vulnerabilities, and the evolving adversary.

Image
abstract cyber technology image with circles
Image
an image of a lock on a computer screen with a world map behind it

Defense

Coordinated resistance to incidents and threats.

The Ataqan Cyber™ Defense Operations include multiple operations all centered and designed around the defense-in-depth strategy and is intended to protect data, networks, and the people working on the systems. Also, our defense operations activities are modeled off the NIST Cybersecurity Framework (CSF) among other frameworks to provide common language that is recognized by the federal government, DoD, and industry overall.

Offense

Active identification of threats and vulnerabilities.

We provide experts that deploy a wide array of tactics, techniques, and procedures to aid in the process of being proactive in the defense of our client’s infrastructure while working to close the gap between discovery and action. The guidance we follow for incident response activities are primarily provided by NIST through their incident response lifecycle breakdown as well as other Tactics, Techniques, and Procedures (TTP) such as leveraging various offense frameworks and standards for our offensive activities.

Image
image of a dark computer screen with bright red security alert text
Image
two colleagues looking at down at a tablet and smiling

Training

Continuous education to support a resilient team and encourage growth.

Continuous education creates a resilient team. Our Ataqan Cyber™ training capability has a wide scope like all our other capabilities, but the primary purpose behind this focus area is to ensure our clients users, teams, organizations, and leadership are trained and aware of what the threat landscape looks like and how to address it. We develop and implement training programs, including train-the-trainer initiatives, that create organization-wide awareness and thorough skillset growth regarding cybersecurity and risk management, taking the time to make sure each person can effectively and proactively protect your infrastructure, regardless of their background or previous knowledge. This capability is tailor-fit to each customer. Recurring training and awareness is a necessity to minimize the potential risks, threats, and vulnerabilities within any organization.

Architecture & Engineering

Designing and guiding implementation of new infrastructures.

Our design and delivery philosophy consists of leveraging Agile and Human-Centered Design practices that aid in the process of building new or refining existing infrastructures to be more resilient and proactive in a security and privacy intentional enterprises. Our scope includes but is not limited to include development activities, network designing, network standup with security and privacy controls identified, and more.

Image
building drawings next to a drill, screws and measuring tape
Image
two people in an office sitting at a table facing each other

Governance, Risk, and Compliance Services

Deploying controls to further security and business goals and follow guidelines set.

Our Governance, Risk, & Compliance (GRC) / Integrated Risk Management (IRM) overarching capability aids our clients with tracking where they are and where they need or want to be in the picture of being compliant with any wide range of standards, policies, guidelines, and procedures they may need to comply with. Our solutions provide expertise, custom software, and dedicated support to stay effective and efficient in maintaining good cyber hygiene.

Our Team

Geoff Vaughan Headshot
Geoff Vaughan
Senior Vice President, Mission & Technology
Corey Chambliss Headshot
Corey Chambliss
Managing Director, Growth & Strategy (M&T)

Pending development of “Our Team” view . See ticket https://aleutfederal.atlassian.net/browse/AFWEB-155

Contact Us

Contact us to learn more about our capabilities and the benefits of working with an Alaska Native corporation (ANC).

How can we help?

* indicates a required field.

*
*
*
CAPTCHA
*
1 + 2 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.