Search for:

Why is CMMI Level 3 Relevant for Cybersecurity?

Maturity models have been around for more than three decades, as early as the 1980s.  The original intent of the Capability Maturity Model (CMM) was to assess the United States Department of Defense (D.O.D.) contractors’ processes.  The success of the software projects was measured using the CMM measurements.  Higher maturity scores were equivalent to better processes.  Higher scores also meant that the contractors used established and reputable processes and best practices for software design, development and quality assurance.

The context in which the term ‘maturity’ was used had special significance.  It was used in reference to specific aspects of the assessment, where the level of organization and optimization of each operation could range from ad hoc to formal.  Because CMM’s initial focus was particularly aimed at improving the software development process, its scope and application was very limited. For this reason, the Software Engineering Institute (SEI) at Carnegie Mellon University revised it.  It then became known as the Capability Maturity Model Integration (CMMI).  This new framework superseded the original CMM in scope.

The extended scope of CMMI now allows it to have a footprint in multiple disciplines.  These include Information and Communication Technology (ICT), business process management, service management, civil engineering, manufacturing and cybersecurity.

.

Operations Management

MAGNUS Operations Management offers our clients the full range of consulting services. These services include:

  1. Development of Operations Strategy concepts,
  2. Product and Service Management,
  3. Service Delivery & Support,
  4. Integration Management
  5. IT Management.

Additionally by combining our functional Operations Management competencies with specific industry knowledge we are able to serve our clients with customized approaches responding best to their specific requirements and needs. A great deal of our focus is on efficiency and effectiveness of processes. Therefore, MAGNUS Operations Management consulting often includes substantial measurement and analysis of internal processes.

Security Operations Center (SOC)

You’re securely up and running. We keep it that way. The MAGNUS team provides the full suite of security operations center services, drawing on years of experience in high-profile, high-stakes environments.

We offer our customers the full range of security operations center services. Whether we’ve built the system or have been engaged to manage it, we successfully and effectively meet our customers’ needs – and then some.

We ensure their applications, databases, servers, networks and other endpoints are secure. We perform continuous monitoring and assessment. But that’s table stakes. We go beyond the traditional SOC engagement to develop strategies and program management protocols that enhance our customers’ SOC objectives.

We measure and analyze – all the time – to ensure continuous improvement. We combine leading-edge industry knowledge and emerging techniques to keep our customers not only secure but aware and on offense. We customize our approach in line with specific requirements and needs. We’re agile, nimble and flexible; we’re also smart, fast and good.

Customers Turn to Us For:

  •  Security Program Management
  •  Security Awareness & Education
  •  System Authorization
  •  Agile Security Awareness
  •  Cyber Threat Intelligence & Analysis
  •  Defense Posture Assessment
  •  Incident Detection & Response
  •  Insider Threat Prevention & Detection