CORE

CORE

Cybersecurity Open-Source

Research & Evaluation

MORE ABOUT CORE

CORE: BEYOND BUSINESS INTELLIGENCE


Organizations utilize CORE by NTS for obtaining unbiased, in-depth evaluations of potential vendors, subcontractors, and partners as a matter of due diligence. With an emphasis on cybersecurity, data integrity, and FOCI concerns, NTS analysts scrutinize publicly and commercially available information using a myriad of cutting-edge forensic tools to protect our clients’ reputation and ensure they remain compliant with all relevant regulatory requirements.

THE CYBER LANDSCAPE


Over the past five years, we’ve seen more than a 200% increase in attacks that have caused millions of dollars in damages due to data breaches alone. This upward trend is further aggravated by the rising popularity of employees working remotely, the use of AI for developing more complex attacks, and advancements in network technology.

FOCI CONCERNS


Similar to cybersecurity and data integrity, Foreign Ownership, Control, or Influence (FOCI) is a concern for federal agencies and the DIB as it can lead to unauthorized access to sensitive information which could compromise national security. While the US Government authorizes foreign investment, that latitude is limited to the extent that it doesn't compromise national security.

THE PROCESS


Our partnership begins with an in-depth consultation to fully understand your requirements and evaluation objectives. Once the scope is defined, NTS initiates a detailed business intelligence and cyber evaluation protocol, that is tailored to the unique needs of your organization. Upon completion, you will receive a report that comprehensively outlines identified risks, potential foreign influences, and relevant attribution insights.

CORE REPORTS


While our investigative protocols are fully customizable, every CORE report provides a baseline analysis of each identified entity against several critical parameters:

  • Organizational Compliance with Relevant Regulatory Requirements
  • Corporate (and / or Program-Level) Cybersecurity Posture
  • Security of Data Architectures
  • Performance Against Simulated Adversarial Attacks
  • Cyber Performance and Data Integrity of Offered Products / Solutions
  • Instances of Potential Foreign Ownership, Control, or Influence
  • Analysis of Patents and Other Intellectual Property Risks
  • Employee and Consultancy Affiliations

PAST PERFORMANCE


NTS investigators on CORE contracts have uncovered instances of foreign influence that were not identified through standard due diligence methods. In one such case, an organization within a federal agency nearly entered into a partnership with a vendor who was discovered to have hidden connections to a foreign adversary. This was not a matter of benign or insignificant influence, either. This vendor was actively stealing software, which resulted in litigation and fines, and was ultimately dissolved months later.


Without CORE’s specialized processes, our client would have unknowingly entered into a partnership with a bad actor who slipped through the cracks of standard government vetting. Thankfully, the risk to national security was mitigated long before any damage could be done. Apart from the time and financial resources preserved through CORE’s findings, NTS prevented our client from becoming embroiled in litigation or jeopardizing their reputation.

DOWNLOAD A BROCHURE


Download a copy of our trifold brochure to share this information within your organization or with those who may benefit.

Share by: