Skip to main content

Cyber Security 2


Cybersecurity is everchanging and keeping up with the adversary is becoming increasingly difficult. At 22nd Century we understand the cybersecurity landscape and the ever-evolving challenges organizations face. Our highly trained cyber experts come from the DOD, Federal Government, and industry. We offer full-spectrum cyber services, tailored to your organization’s individual needs.

22nd is a cybersecurity thought leader with a mature Cybersecurity Center of Excellence (CoE) to anchor emerging cybersecurity tools and technologies, develop competencies, analyze and support customer challenges, research and create new processes as well guide our dedicated SOCs and MSS. We have over 800 cybersecurity consultants safeguarding our nation’s institutions and helping them address threats before they happen thus enabling organizations to carry on with their missions.

Cybersecurity services, including dedicated Security Operations Centers (SOCs) and Managed Security Services (MSS), is another key area at 22nd Century and extremely critical to our customers. We are currently supporting 14 Executive Federal Agencies, DoD, Army, Navy and Air Force in sensitive security initiatives. We are also supporting the State and Local organization with our cyber services. 22nd Century Technologies is committed to a standards-based delivery system security program as the foundation of our support Cyber Security Services. We provide a publicly accessible and documented framework through which program objectives are implemented, resulting in reduced risk and the increased predictability of program outcomes.

Cybersecurity Services

  • vCISO
    • Policy/Plan/Document Development
    • Mitigation Action
    • Risk Assessment
    • Incident Response
    • Cyber Training
    • Industry Guidance
  • Cybersecurity Posture Review
    • Security Policies
    • Security Personnel Readiness
    • Management Readiness
    • Security Equipment Review
    • Incident Response Readiness
  • Ransomware Readiness Assessment
    • Ransomware Readiness
    • Ransomware Response
  • Vulnerability Assessment
  • Phishing Assessment
  • Risk and Vulnerability Assessment
    • Penetration Testing
    • Web Application Testing
    • Application Testing
  • SOC-as-a-Service
  • Managed Detection and Response
  • Consultants
  • Education
  • Cyber Exercises
  • SOC Deployment