To accomplish Government missions, agency personnel and contractors need access to current and accurate information. At the same time, sensitive and private information must be protected. In the face of rapid technological advances, information assurance professionals and all users of Government data systems must understand the technical vulnerabilities inherent in all devices and remain ever vigilant to protect Government systems and information against cyber attacks.

Since 1994, Carney has developed numerous Cyber Security solutions for DoD and Federal Government personnel and contractors, primarily for the Defense Information Systems Agency, but also for the Defense Security Service and numerous other Government organizations. Our training and performance support solutions, ranging from information security awareness training to interactive how-tos for Government system administrators, have raised the awareness and skill of more than 5 million Government and contractor personnel worldwide.

Services and Solutions

  • Learning strategy consulting
  • Curriculum analysis
  • Training needs analysis
  • Web-based training courses
  • Short format learning (Shorts™)
  • Instructor-led training
  • Graduate-level distance learning (DL) courses
  • Performance support tools

Selected Projects

  • Common IT Security Flaws
  • Computer Network Defense Information Sharing
  • Cyber Awareness Challenge
  • CyberOps NetDefender Tutorial
  • Cyber Protect
  • Designated Approving Authority
  • DoD Information Assurance Certification and Accreditation Process (DIACAP) Overview
  • Identifying and Safeguarding Personally Identifiable Information (PII)
  • Information Assurance Awareness
  • Information Assurance Roles and Responsibilities
  • Information Systems Security
  • Intelligence Community (IC) Information Assurance Awareness Course
  • Oversight of Information System Security and Cybersecurity by DoD Security Specialists (Graduate-Level DL)
  • Phishing Awareness
  • Portable Electronic Devices and Removable Storage Media
  • Privileged User IA Responsibilities
  • Using PKI – Public Key Infrastructure
  • Security Requirements Guides (SRGs) and Security Technical Implementation Guides (STIGs)
  • Smartphones & Tablets
  • Social Networking
  • The Future of Security Systems and Information Assurance to Support DoD Security Programs (Graduate-Level DL)