ICS uses an integrated project management approach, combined with best practice methodologies for effective project planning, directing, controlling, and reporting. Using ISO 9001:2008 compliant management processes, supported by automated systems that provide timely progress reports on performance, schedule, cost, quality, risk, and customer satisfaction, ICS has the plans, resources, and capabilities to effectively execute the tasks required on any given engagement.
ICS performed a Risk Assessment for a government agency in the southeastern United States to identify security vulnerabilities within their IT systems and resources. The agency completed the modifications and updates recommended in the assessment, and contacted ICS again to perform a gap analysis on the modified security program.
ICS helped a rapidly growing Southeastern Chamber of Commerce that was busy adding locations, business units and members as it struggled with balancing the financial constraints of a non-profit organization, demands of its members, with the needs of its employees to operate in a stable, reliable, safe IT environment in which to operate on a day-to-day basis.
In 2007, ICS performed Continuity of Operations & Continuity of Government Planning for a Florida state agency to ensure agency operations could be conducted efficiently in the face of a disaster.
A non-profit legal services organization experienced a need for forensics discovery to provide evidentiary support for a class-action lawsuit. The organization obtained a subpoena for electronic evidence to be obtained and consulted ICS for forensics analysis services.
A financial institution’s consistent growth and expansion of network-based services and applications had taxed the existing network and communication infrastructure. ICS was called in to analyze the network architecture and propose solutions that would increase the IT department’s overall ability to manage the WAN, and control content across the network.
Duval County Public School officials understood that with the magnitude of IT systems and resources within their district, and reports of security breaches within school system databases across the country on the rise, that it was imperitive to have their systems evaluated by an outside source that specializes in IT security assessments and strategic planning.