Skip to main content
  • Hamburger
    • Company
      Company Overview
      • Mission, Vision, & Values
      • Our Business
      • Leadership
      • Diversity, Equity, & Inclusion
      • Responsibility & Sustainability
      • Ethics & Compliance
      • Rankings & Awards
      • Partners
      • Contract Vehicles
      • Global
      • History
    • Markets
      Markets Overview
      • Aviation
      • Defense
      • Energy & Industry
      • Government
      • Healthcare
      • Homeland
      • Intelligence
      • Science
      • Space
    • Capabilities
      Capabilities Overview
      • Cyber Operations
      • Digital Modernization
      • Integrated Systems
      • Mission Operations
      • Mission Software Systems
      • Enabling Technologies
      • Technology Certifications
    • Insights
      Insights Overview
      • Latest Insights
      • Newsroom
    • Careers
      Careers Overview
      • Latest Opportunities
      • Life at Leidos
      • Pay & Benefits
      • Frequently Asked Questions
      • Careers in Australia
      • Careers in the UK
    • Investors
    • Employees
    • Suppliers
    • Global
    • Contact
  • Search
  • Leidos
Back to top

Breadcrumb

  1. Home
  2. Capabilities
two people looking at laptop

Cyber Operations

Accelerating cybersecurity in a changing world

Emerging threats require innovative cyber protection

Leidos is a recognized leader in cybersecurity across the federal government, bringing decades of experience defending cyber interests globally and delivering advanced capabilities honed from protecting some of the world’s most valuable assets. Our solutions and services ensure an adaptive defense strategy, sustainable threat protection, and a mature security posture. Our 2,900 cybersecurity professionals stand ready to secure your enterprise.

Our cyber capabilities

Featured

Federal leaders speak out

Hear directly from government experts on how they see the cyber landscape taking shape above and beyond what's required in President Biden's 2021 Cyber Executive Order.

Read the Report
cyber analyst working in a SOC

Getting in front of cyberattacks with Beyond Compliance

In the cyber world, the need for security is always increasing. The pace at which threats progress and learn from our security systems means the bare minimum is no longer the minimum. That's why the Beyond Compliance mindset has become crucial for organizations. Today, Meghan Good, vice president, director for Cyber Accelerator joins the MindSET podcast to explain what Beyond Compliance means, how it works, and the best way for organizations to begin with this modern-day approach to cybersecurity.
 

Cyber-Physical Systems

As new technologies and connected devices augment manual tasks, what can agencies do to secure their cyber-physical systems? Read the below white papers to learn more.

Federal agencies securing their cyber systems
adopting medical systems

Quantum

Quantum technologies offer critical advantages to inaccessible classical technologies. Collaboration with Leidos’ recognized leaders in cybersecurity, digital modernization, intelligence, defense, AI/ML, and software drives multi-disciplinary innovation with emerging quantum technologies to build practical solutions for our customer’s challenges.

Learn more about Quantum
girl looking at screen

Zero Trust

Zero Trust is a concept that challenges traditional cybersecurity thinking. It assumes that networks are either actively under attack or already breached.

Learn More
abstract wave of zeros and ones

SOC to SIC

PACKIT™ (Proven, Analytic-Centric Kill Chain Implementation and Transformation) is our threat-based approach to conducting and improving cyber defense. PACKIT leverages people, process and technology to operationalize and implement an analytical framework (i.e., kill-chains) to improve an organization’s cybersecurity posture.

Learn about PACKIT
woman on phone looking at computer screen while typing

Cyber Resiliency

As a company, we design, build, and deploy valuable assets – IT, data systems, networks, or platforms – for our customers. Using our cyber expertise, we continually enhance our techniques and processes to build systems that operate resiliently in the face of evolving cyber threats. We put hardware and software to the test – through penetration testing, reverse engineering, adversarial simulations and assessments – to identify gaps in security and develop the best solutions for our customers’ systems.

woman looking at laptop

Risk Management Framework

Security, at its core, is a risk analysis and management activity. This starts with a successful system authorization to operate (ATO) and proper alignment to the risk management framework (RMF). In addition to expertise, Leidos' Risk and Privacy Management Acceleration Playbook (RAPMAP) is a repeatable playbook to implementing the RMF, where best practice tools, templates, and techniques are provided to our customers.

Learn more about RMF
two business people standing in a hallway looking at tablet

 

The new age of cybersecurity

Today’s cybersecurity threat landscape is sophisticated, complex and ever-evolving. Protecting critical networks and data from breaches requires a comprehensive approach that combines top-tier technical expertise, high-end human talent and a culture of excellence. Hover over the images below to learn more about how Leidos approaches combat with the modern cyber adversary.

Zero Trust: The new way forward in cybersecurity

Zero Trust is a cybersecurity approach that looks at security not just from the lens of keeping people out, but also at how we can protect all spaces when hackers do get in. It's not necessarily a new mindset, but it's been seeing a lot of traction since President Biden signed an executive order in 2021 making adoption mandatory for federal organizations. Jeff Mims joins the show to explain more about what it is, how it works, and why it's so important.

Cyber Analytics

Our Foundational Automation Support Technology (FAST) framework is an innovative approach to automatically discover and track all IP-addressable network devices — reducing manual, labor-intensive processes like asset inventory. This approach facilitates a configuration management database (CMDB) and incorporates AI and machine learning to understand event relationships better and perform predictive analytics between events.

woman looking up while reviewing monitor screens

Information Assurance

Keeping pace with the Federal Information Security Modernization act is vital for every company. To help, Leidos developed IonIA™, a product that helps you determine what is reportable under FISMA. IonIA ensures you're adhering to FISMA by defining, maintaining, and repetitively monitoring your systems through every security layer.

Learn about Information Assurance
3 people at computers

Insider Threat

Our risk-based services integrate both technical and non-technical system elements for a truly holistic defense against insider threats. Using anomaly detection and analytics, we identify unusual activity based on peers, time of day, and previous activity and correlate this activity with external risk factors to produce a weighted risk score and prioritize internal investigations. Our proven solutions can complement existing technical tools or be deployed independently.  

Understand Our Approach
man at computer

Accredited Testing & Evaluation

The Leidos Accredited Testing and Evaluation (AT&E) Lab is accredited by the National Institute of Standards and Technology (NIST) NVLAP Program (Lab code 200427-0). As the industry volume leader, our AT&E Lab has certified more than 1000 IT security products across 100+ commercial product vendors since 2000, including Microsoft, Hewlett Packard Enterprise, Dell, Cisco, and Symantec. 

Learn about our Labs
two coworkers in a data center working on computer screen

EXCITE

To help information security professionals proactively remediate and mitigate advanced threats, Leidos developed Experiential Cyber Immersion Training and Exercises — EXCITE — a set of realistic, hands-on exercises that immerse students in the reconstruction and mitigation of a full attack scenario in a lab environment.

Learn more about EXCITE
coworkers talking by computers

Electronic Warfare

Helping customers keep our nation safe with advanced-capability, cognitive, small form-factor RF/signal processors, designed for signals intelligence, electronic warfare, radar, and jammer applications.

Learn more about our solutions
three coworkers looking at monitor together

Cybersecurity on a mission 

Securing what's important in an ever changing threat landscape has never been more complex. Explore how Leidos can support you as a recognized leader in cybersecurity with 2,900+ cybersecurity certifications and over 30 years' experience protecting your network and defending against global cyber attacks.

Explore more

Enabling Technologies

Our enabling technologies are the backbone of our core capabilities, supporting our customer's important work from the front lines.

Learn about our tech
  • Secure, Rapid Software
  • Trusted AI/ML
  • Full-Spectrum Cyber
  • Rapid Prototyping & Manufacturing

Resources

Stay informed on our innovations with the resources to advance your mission and secure what matters most to your organization.

  • Zero Trust Solutions Fact Sheet
  • Digital Architecture & Network Applications Engineering (DANAE) Fact Sheet
  • AIOps Anomaly Detection Fact Sheet
  • Analyst Pipeline Fact Sheet
  • Castle Clone Fact Sheet

Related Insights

Video
The intersection of AI governance and cybersecurity
Read More
Article
Advancing cybersecurity beyond compliance to resilience
Read More
Video
The Zero Trust journey: Architecting today for tomorrow’s technologies
Read More
View More insights

Contact a cyber expert

With our proven solution suite and highly skilled professionals, we can provide comprehensive support no matter where you are on your cybersecurity journey.

  • Company
    • Mission, Vision, & Values
    • Leadership
    • Diversity, Equity, & Inclusion
    • Responsibility & Sustainability
    • Ethics & Compliance
    • Rankings & Awards
    • Partners
    • Contract Vehicles
    • Global
    • History
  • Markets
    • Aviation
    • Defense
    • Energy & Industry
    • Government
    • Healthcare
    • Homeland
    • Intelligence
    • Science
    • Space
  • Capabilities
    • Cyber Operations
    • Digital Modernization
    • Integrated Systems
    • Mission Operations
    • Mission Software Systems
    • Enabling Technologies
    • Technology Certifications
  • Insights
    • Latest Insights
    • Newsroom
  • Careers
    • Life at Leidos
    • Pay & Benefits
    • Alumni
    • FAQs
    • Careers in Australia
    • Careers in the UK

Want to know more?

Contact us about product information and pricing, customer feedback, stockholder services, or just to voice a concern.

Get started

  • © 2024 Leidos

  • Trust
  • Terms of Service
  • Privacy

  • Ad Choices
  • Email Preferences
  • Do Not Sell My Personal Information
  • © 2021 Leidos
  • Australian Privacy Statement
  • Australian Whistleblower Policy
  • Ad Choices
  • Email Preferences
  • Do Not Sell My Personal Information

Utility Footer Navigation

  • Products
  • Customers
  • Suppliers
  • Investors
  • Employees
  • Accessibility
  • Twitter
  • Facebook
  • Instagram
  • Linkedin
  • YouTube