We provide resilient solutions to identify, protect, detect, respond, and recover from current and emerging cyber threats.

We provide resilient solutions to identify, protect, detect, respond, and recover from current and emerging cyber threats.

New opportunities and threats in cyber-infrastructure are constantly evolving. And we know cybersecurity is an integral part of maintaining our nation’s National Airspace System (NAS) infrastructure. We provide hands-on technical skills that bring the strategic vision, program management structure, technical acumen, and business rigor to strengthen operations and resilience to the federal government. We understand that CS is a key mission multiplier in ensuring the resiliency of the NAS. We provide hands-on technical skills that support the FAA cyber vision. We also provide support to our global partners to ensure strategic harmonization, and our ability to continue operations under adverse conditions.

We are experienced information technology (IT) and operational technology (OT) professionals within critical infrastructure, mission support, and administrative business environments.


  • Risk Management
  • Incident Response
  • International Engagement 
  • Security Awareness & training
  • Data Classification
  • Information System Continuous Monitoring (ISCM)
  • System Security Engineering
  • Requirements Dev
  • Enterprise Architecture
  • Network Architecture
  • Cyber Intel
  • Threat Modeling
  • Enterprise Architecture
  • Mission Assurance
  • Privacy Compliance
  • Strategic Planning
  • Cloud Adoption & Integration
  • Contingency Planning
  • Information Assurance
  • Impact Assessment
  • Program Management
  • FISMA Compliance
  • Audit & Compliance
  • Supply Chain Risk Management
  • Network Engineering
  • Cybersecurity Policy & Governance
  • Workforce Development
  • Penetration Testing
  • Remediation Management
  • DevSecOps

Governance & Compliance

Forming the backbone of your cybersecurity function are the standards, policies and governance that need to be clearly written, specific to your mission, consistent with your business objectives, and aligned with your compliance requirements. Comprehensive governance solutions should also reinforce cyber hygiene, enhance security awareness and instantiate practices that reduce or mitigate risk. LST has expertise in developing standards, creating effective policies, and integrating governance processes that harmonize with your other policies and regulatory requirements.

Frameworks, Processes & Tools

Our priority is to ensure the ATO is resilient enough to protect, detect, respond, and recover from cybersecurity incidents while maintaining safe, efficient air traffic operations.  (Minimize impact of events and incidents to air traffic opps) Cybersecurity threats are rapidly evolving, perpetrated by world-class threat actors with unlimited resources to carry out attacks on the FAA that are more persistent and more sophisticated than ever before.

Increasingly more pathways have become viable vectors for launching a cyber-attack, including supply chain compromise, information technology to operational technology (IT/OT) touch points,  insider threats, Supervisory Control, and Data Acquisition (SCADA) & Industrial Control Systems (ICS), and satellite bases communications. This constant evolution is why we must continue to adapt and evolve to be resilient enough to withstand and recover from cybersecurity events and attacks.

Security Architecture and Enterprise Solutions, and Engineering

Our approach to security architecture, enterprise solutions, and engineering relies on collaboration with external and internal stakeholders to develop a standard solution for shared risks. We leverage a deep understanding of the ever-evolving threat landscape to continue to adapt solutions to the FAA’s unique and dynamic environment. LST continuously researches new and emerging technologies to evaluate their utility in your environment. We help identify enterprise-level capabilities and adapt the architecture to integrate solutions within roadmaps in alignment with cybersecurity strategic planning. Our engineers assist in planning for new technology insertion, capabilities, and solutions identified on the roadmap by collaboratively developing project, program, and enterprise requirements for the solutions.

Operational Risk Management

Cyberattacks can halt operations, erode customer trust, and cause financial and economic disruptions, which can be disastrous in this fast-paced global economy.

LST develops a deep understanding of your operation and its business environment so that we assess risk in the context of your specific needs. We conduct operational impact analysis with multiple dimensions including safety, mission assurance, business continuity, and privacy. We help develop prioritization strategies to mitigate operational impacts using both quantitative and qualitative risk assessments. Additionally, we provide domain expertise to assist with authorization, implementation, and remediation activities.

Planning, Monitoring, and Control

By establishing effective planning, monitoring, and control, your cybersecurity organization becomes well-run with consistent predictable results. LST applies disciplined project and portfolio management to support your program activities throughout the investment, development, deployment, and operations phases. Our project management professionals provide budget planning and execution, schedule management, program control, stakeholder engagement, and strategic planning support.

Cyber News