1010 Wayne Avenue Suite 650

Silver Spring,MD 20910

301-588-3248 Office

301-588-8534 Fax


In The Spotlight


WTG won the opportunity to assist BTF with their Defense Information Assurance, Certification and Accreditation Process (DIACAP). WTG provided support in the identification and documentation of risks and recommendations to mitigate those risks toward acceptable levels.



Whether in turbulent economic times or during periods of prosperity and growth, many organizations are concerned about the security of their information databases and supporting infrastructure. Questions include: “Do I have the right security in place to protect my client’s information?” “When was the last time we did a hard-test of our critical systems?” “How do I determine the best course of action to secure my data?” WTG can help.

Our team of highly skilled, customer-focused and certified Information Security professionals are experts in reviewing your existing security environment and recommending an Information Assurance Plan that is customized for your organization’s unique operating environment.

DIACAP Federal Program Certification

WTG delivers Information Assurance analysis, testing and evaluation, and documentation development in support of DIACAP Certification to Federal clients. WTG’s DIACAP services include the following components:

  • Initiate the DIACAP Package and workflow
  • Assign IA Controls and other requirements and develop the DIACAP Implementation Plan
  • Conduct an Analysis of the System Life Cycle Status and Configuration
  • Conduct the Certification and Accreditation (C&A) testing Analyze and compare the test results
  • Produce the DIACAP Scorecard
  • Create and implement the Plan of Actions and Milestones (POA&M) to resolve issues

Information Assurance Services

  • Certification and Accreditation (Specializing in DIACAP, CNSS, NIST & FISMA requirements)
  • Enterprise-wide Security Architecture and Models
  • Security Management Practices
  • Access Control Systems & Methodology
  • Security Policies and Procedures Development, Documentation, and Maintenance
  • Application Development Security
  • Operations Security
  • Physical Security
  • Cryptography
  • Telecommunications, Network & Internet Security
  • Security Audits, Risk Assessment
  • Business Continuity, Critical Infrastructure Continuity And Contingency Planning
  • Information Security and Cyber Security Awareness Training
  • Installation and Configuration of Security Hardware and Software, including Firewalls, Intrusion Detection Systems (IDS), Virtual Private Networks (VPNs), Hardware Tokens, Smart Cards, Digital Certificates and PKI