
Cybersecurity
Smarter Full-Spectrum Cyber
Evolving Threats Require Smarter Full-Spectrum Cyber
Leidos' capabilities are constantly evolving to counter the cyber threats of tomorrow. Our tools and technologies, encompassing AI and Zero Trust principles, enhance national security and help our customers meet mission objectives by delivering resilient outcomes that stop the adversary. We build smarter full-spectrum cyber solutions for our customers that support the development of new cyber defenses, sharpening of tools for warfighters, the research and development of innovative technologies, and cultivation of the next-generation of cyber talent.
Our Approach
Cybersecurity for the warfighter
Cyber warfighters must operate with superior combined offensive and defensive capabilities, driven by timely, relevant, and accurate intelligence.
Offensive Cyber Operations
Offensive cyber capabilities offer cost-effective, scalable options as alternatives to kinetic warfare. Those capabilities include the targeting of cyber and physical domains, creation of cyber tools, and delivery of intended effects. Leidos capabilities in this area include those related to security engineering and computer network operations, signals intelligence, cryptographic key management operations, and more.

Defensive Cyber Operations
Advanced cyber defense poses significant challenges in a multi-domain, integrated battlefield. It includes multi-domain and multi-system defense, AI-augmented defense, and counter information operations. We have the next-gen capabilities and tooling for advanced threat hunting, weapons system security, critical infrastructure security, and protecting our most important National Security systems.

Intelligence Support
Cyber adversaries can leverage advances in artificial intelligence, quantum computing, and software development to scale their strategic cyber warfare capabilities in pursuit of tactical and operational-level advantages. U.S. cyber forces must be trained and operationally focused on defending vital nodes and reciprocating these campaigns to deter our adversaries in cyberspace.

Scaling Cyber Warfare: Insights on the Future of Defense and Offense
Cyber Defense
With our AI-driven cyber defense solutions, we move beyond mere response; we anticipate, adapt, and act preemptively. These solutions embody the essence of advanced intelligence, transforming traditional cyber defense into a proactive, resilient, and adaptive strategy.
Zero Trust
Zero Trust is the integration and consolidation of documented cyber principles, established to minimize the impact of breaches. We work with enterprises to assess their Zero Trust readiness level and then transition their cyber protection to a Zero Trust Architecture.

Security Operations Centers
PACKIT™ (Proven, Analytic-Centric Kill Chain Implementation and Transformation) is our threat-based approach to conducting and improving cyber defense, transforming Security Operations Centers (SOCs) to Security Intelligence Centers (SICs). PACKIT leverages people, process and technology to operationalize and implement an analytical framework (i.e., kill-chains) to improve an organization’s cybersecurity posture.

Cyber Resiliency
As a company, we design, build, and deploy valuable assets – IT, data systems, networks, or platforms – for our customers. Fusing our expertise in risk management, digital engineering/MBSE, hardware and software engineering, and supply chain management, we harden assets so they are resilient to risks, threats, and vulnerabilities and continue to operate under duress or attack.
Related Content: Information Assurance

Cyber Analytics
Our Foundational Automation Support Technology (FAST) framework is an innovative approach to automatically discover and track all IP-addressable network devices — reducing manual, labor-intensive processes like asset inventory. This approach incorporates AI and machine learning to understand event relationships better and perform predictive analytics between events.

Insider Threat
Our risk-based services integrate both technical and non-technical system elements for a truly holistic defense against insider threats. Using anomaly detection and analytics, we identify unusual activity based on peers, time of day, and previous activity and correlate this activity with external risk factors to produce a weighted risk score and prioritize internal investigations. Our proven solutions can complement existing technical tools or be deployed independently.

Testing & Evaluation
The Leidos Accredited Testing and Evaluation (AT&E) Lab is accredited by the National Institute of Standards and Technology (NIST) NVLAP Program (Lab code 200427-0). As the industry volume leader, our AT&E Lab has certified more than 1000 IT security products across 100+ commercial product vendors since 2000, including Microsoft, Hewlett Packard Enterprise, Dell, Cisco, and Symantec.

Exploring cyber defense in a digital age
Discover how AI is transforming cybersecurity with Meghan Good, senior vice president of technology integration, and Bobby Scharmann, vice president of the Leidos Cyber Accelerator. This conversation highlights the intersection of AI, software, and cybersecurity, showcasing how these elements combine to tackle evolving threats with precision and resilience. Gain valuable insights into the transformative impact of these technologies on securing the future of digital operations.
AI has upended cybersecurity. Only AI can fight back.
Artificial intelligence tools are completely changing how adversaries plan and perpetrate cyber attacks, and U.S. companies and government agencies are prime targets for these new assaults. AI-powered cyber threats is the top concern for senior risk executives and managers, according to a survey by Gartner, a top research and consulting firm. To defend against these emerging threats, we must turn to AI-enabled cyber defenses. Meghan Good, senior vice president of technology integration, explains.
Cyber Innovation
Leidos’ Cyber Accelerator holds nearly two dozen patents, with steady investment in novel technologies and approaches in the areas of Cyber AI, Quantum, and more.

Cyber AI
Automating the discovery of vulnerabilities and development of novel defenses

Quantum Technologies
Transforming secure communications and data protection with quantum-augmented solutions
Learn more
OT Cyber Resilience
Using Trusted Mission AI to secure critical systems, including SCADA/ICS environments