Information Security

Information Security

As an affordable, high-performance, lightweight, multi-function system, the Electro-Optical Targeting System (EOTS) provides precision air-to-air and air-to-surface targeting capability in a compact package through a high speed fiber-optic interface.

As an affordable, high-performance, lightweight, multi-function system, the Electro-Optical Targeting System (EOTS) provides precision air-to-air and air-to-surface targeting capability in a compact package through a high speed fiber-optic interface.

Objective

To minimize the likelihood and impact of cybersecurity incidents on our business operations and customer missions and protect business-sensitive, customer and personal information from external and internal threats.

We rely on security thought leaders, talented cyber analysts, cutting-edge technology, employee vigilance and innovative processes to defend against advanced cybersecurity threats across our value chain.

Securing operations and infrastructure for ourselves, our customers and our supply chain strengthens the stability and resilience of the hyper-connected society we seek to protect.

Sustainability factors

Through our biennial assessment of sustainability issues, we classified two tiers of priorities: Tier 1 performance factors where we seek to accelerate progress by setting targets for 2017 and 2020; and Tier 2 factors that we will advance through continued management and disclosure, without setting new SMP goals. We define Business Integrity through these factors:

Tier 1

SENSITIVE DATA AND IP PROTECTION

Efforts to protect company and supplier proprietary information to reduce the likelihood of data fraud, loss, sabotage and theft.

CUSTOMER INFORMATION SYSTEMS AND NETWORK SECURITY

Efforts to ensure our products and processes capture, store and transfer data securely to protect the privacy and security of customer information and reduce the likelihood of data fraud, loss, sabotage and theft.

EMPLOYEE PRIVACY AND DATA PROTECTION

Efforts to protect the privacy and integrity of employee data to reduce the likelihood of data fraud, loss, sabotage and theft.

Case study

SAFEGUARDING SENSITIVE DATA

Our ability to safeguard innovations from adversaries has implications to our business operations and customer relationships. Enforcing security measures that match the value of this sensitive data will help ensure our company’s future and proliferate advanced technology in commercial markets.
Case study

SAFEGUARDING PRODUCTS AND SUPPLY CHAINS AGAINST CYBER RISK

Systemic cybersecurity is a high priority as technology systems become more connected and Interdependent and attacks can be catastrophic and cost billions of dollars in damage. By designing cybersecurity into our engineering and software development processes we can enable more efficient and assured offerings to the federal government and customers.
Case study

ENHANCING INSIDER THREAT DETECTION

Data breaches resulting from insider actions can be insidious and costly. Insider threats not only affect company financial performance, they can lead to degradation of government or company information, resources and capabilities. Through our enhanced insider threat detection program we can better identify employees at risk, reduce their vulnerability and help protect them.
Join our team
See our jobs

From protecting the world's data to advancing clean energy, we're creating a better world. Find out how you can too.

See our jobs
Download
our report

Discover how we are developing sustainable solutions to complex, global challenges in our 2017 Sustainability Report.

Download Report {{MainReportSize}}mb