Brochures | Sales Sheets | Case Studies | PresentationsICS Blog

Evaluating Agile Effectiveness (AE) of Organizations and Programs

Agile software development is a methodology that emphasizes cross-functional teams interacting in close collaboration to produce working software. On occasion, it may seem disorganized and haphazard, making an effective evaluation of an offeror’s Agile effectiveness (AE) difficult. In this paper, we provide clear prescriptions for the kinds of information evaluators should seek from proposals, and how that information can be used to determine an offeror’s AE.



calcCalculating the Functional Value of Innovation

There are several common obstacles that are impediments to receiving the benefits of innovation, including: a focus on the short term instead of the ROI multiples that can happen in the mid to long term; insufficient provision of time, resources or personnel; no incentives or rewards from management for innovative thinking or developments; lack of a systematic process for innovation; and thinking that innovation is too risky.



Whitepaper: Penetration Testing

A Penetration Test is a method of evaluating the security of a computer system or network by simulating an attack by a malicious user. Following a pen test, your organization will have a much clearer understanding of the weak areas within the IT infrastructure, as well as how to shore up defenses. This whitepaper provides an overview of penetration testing.



Choosing the Right Security Assessment

Navigating the various types of Security Assessments and selecting an IT security service provider can be a daunting task; however, it doesn’t have to be. Download this whitepaper to learn more.




The Business Case for Outsourcing Business Continuity Planning

The goal of a business continuity program is to allow business operations to continue under adverse conditions. Developing a comprehensive business continuity plan will help make sure that can happen – whether the event is a minor interruption or major disaster.

Should you outsource or develop business continuity plans in-house? How do you decide?



Choosing the Right Business Continuity Planning Consulting Firm

Business Continuity and Disaster Recovery planning consultants include mega-firms that can provide end-to-end services; however, many of these companies come with very high price tags. From customized software solutions to nationally recognized standard templates and standard software, find out what questions you need to ask when choosing a business continuity planning consulting firm.



Security Fundamentals: Risk Assessment

An Information Security Risk Assessment is like checking the doors and windows on your network. With all of the confidential corporate and customer information in your database, you would never consider leaving those doors and windows open. But beyond the entryways that are easy to see, are there other less obvious access points?

ISO 9001 2015Technology Industry InnovatorsVeteran Owned Small BusinessCMMI Maturity Level 3CISSP® - Certified Information Systems Security ProfessionalCertified Penetration TesterITIL IT Service ManagementCertified Ethical HackerProject Management Institute CertifiedUS Department of Homeland SecurityDisaster Recovery Institute CertifiedCertified Information Systems Auditor