Cyber Security Systems Engineering

Whether you are designing a system from the ground up or working through a major or even minor technical refresh we got you covered. We can assist at all phases of the system lifecycle from early requirement, into prototyping and production, manufacturing, test & evaluation, and finally into operation. Each phase of the lifecycle has best practices for cyber that should and can be applied.

Cyber Security Testing Services

Perhaps the single most effective way to understand your actual risk is to conduct vulnerability assessments and penetration testing event. At Contested Cyber Labs we won’t stop with the traditional IP space. You have traditional enterprise networks we do that, you have Wi-Fi, BLE, CAN bus, PLC, GPS, ACARS, MODE S, ADS-B, INMARSAT, Iridium, TCAS, or AIS we do that to. In fact we’ve never come up against a protocol we can’t get after. Our philosophy is it doesn’t matter whether the information move over a wire or over the air we find out whether there is a risk.

We take a very methodical approach to our testing because we understand that the systems you may be asking us to test are complex, expensive, and at times extremely critical. We have a proven methodology born out of years of planning and execution with some of the most expensive and complex platforms ever developed for land, air and sea.

Cyber Threat Modeling

You may often find yourselves in a room sitting around a table listening to a bunch of folks do there very best to come up with all the ways in which a system might get “hacked”. Sometimes they are spot on many times they are not. Wouldn’t you like to be able to sift through the noise. We can help with that. Since we have spent our time actually working to get into systems instead of just talking about them we have a pretty good sense of what an adversary can really do given time, money, and effort. We can help you model and categorize your risk in a way that makes sense for you domain area and system.