Cybersecurity (New)


We provide resilient solutions that identify, protect, detect, respond, and recover from current and emerging cyber threats.

We provide resilient solutions that identify, protect, detect, respond, and recover from current and emerging cyber threats.

We are experienced information technology (IT) and operational technology (OT) professionals within critical infrastructure, mission support, and administrative business environments. We know cybersecurity is an integral part of maintaining our nation’s National Airspace System (NAS) infrastructure, and new opportunities and threats in cyber-infrastructure are constantly evolving. We provide hands-on technical skills that bring the strategic vision, program management structure, technical acumen, and business rigor to strengthen operations and resilience to the federal government and our global partners.


Risk Management

Incident Response

International Engagement 

Security Awareness & training

Data Classification

Information System Continuous Monitoring (ISCM)

System Security Engineering

Requirements Dev

Enterprise Architecture

Network Architecture

Cyber Intel

Threat Modeling

Enterprise Architecture

Mission Assurance

Privacy Compliance

Strategic Planning

Cloud Adoption & Integration

Contingency Planning

Information Assurance

Impact Assessment

Program Management

FISMA Compliance

Audit & Compliance 

Supply Chain Risk Management

Network Engineering

Cybersecurity Policy & Governance

Workforce Development

Penetration Testing

Remediation Management


Governance & Compliance

The backbone of cybersecurity capacity is the standards, policies, and governance specific to the mission, consistent with the business objectives, and aligned with compliance requirements. Comprehensive governance solutions should also reinforce cyber hygiene, enhance security awareness and instantiate practices that reduce or mitigate risk. LST has expertise in developing standards, creating effective policies, and integrating governance processes that harmonize with your other policies and regulatory requirements.

Frameworks, Processes & Tools

Our priority is to ensure the ATO is resilient enough to protect, detect, respond, and recover from cybersecurity incidents while maintaining safe, efficient air traffic operations. Cybersecurity threats are rapidly evolving, perpetrated by world-class threat actors with unlimited resources to carry out attacks on the FAA that are more persistent and more sophisticated than ever before.

Increasingly more pathways have become viable vectors for launching a cyber-attack, including supply chain compromise, information technology to operational technology (IT/OT) touchpoints, insider threats, Supervisory Control, and Data Acquisition (SCADA) & Industrial Control Systems (ICS), and satellite bases communications. This constant evolution is why we must continue to adapt and evolve to be resilient enough to minimize the impact of events and withstand and recover from cybersecurity events and attacks.

Security Architecture and Enterprise Solutions, and Engineering

Our approach to security architecture, enterprise solutions, and engineering rely on collaboration with external and internal stakeholders to develop a standard solution for shared risks. We leverage a deep understanding of the ever-evolving threat landscape to continue to adapt solutions to the FAA’s unique and dynamic environment. LST continuously researches new and emerging technologies to evaluate their environmental utility. We help identify enterprise-level capabilities and adapt the architecture to integrate solutions aligned with cybersecurity strategic planning. Our engineers assist in planning for new technology insertion, capabilities, and solutions identified on the roadmap by collaboratively developing project, program, and enterprise requirements for the solutions.

Operational Risk Management

Cyberattacks can halt operations, erode customer trust, and cause financial and economic disruptions, which can be disastrous in this fast-paced global economy. LST develops a deep understanding of operations and the business environment to assess risk in the context of your specific needs. We conduct operational impact analysis with multiple dimensions, including safety, mission assurance, business continuity, and privacy. We help develop strategies to mitigate operational impacts using quantitative and qualitative risk assessments. Additionally, we provide domain expertise to assist with authorization, implementation, and remediation activities.

Planning, Monitoring, and Control

Your cybersecurity organization becomes well-run with consistent, predictable results by establishing effective planning, monitoring, and control. LST applies disciplined project and portfolio management to support your program activities throughout the investment, development, deployment, and operations phases. Our project management professionals provide budget planning and execution, schedule management, program control, stakeholder engagement, and strategic planning support.

Cyber News

New Office Group Photo

New Office Demo

The demo has finally begun for our new office, scheduled to open in October. After months of planning, this is an exciting moment for

Read More »