GSA 70 HACS cyber security background

DVS has been awarded the Highly Adaptive Cybersecurity Services (HACS) Special Item Number (SIN) under the General Services Administration (GSA) Schedule 70 Information Technology (IT) contract.

GSA developed IT Schedule 70’s HACS SIN 132-45 in collaboration with the Department of Homeland Security (DHS) and the Office of Management and Budget (OMB) to make it easier for agencies to procure quality cybersecurity services. HACS provide agencies quicker access to key support services from technically evaluated vendors that will:

DVS has been approved for all five (5) subcategories under the HACS SIN, including:

  1. High Value Asset Assessments: include Risk and Vulnerability Assessments (RVA), Security Architecture Review (SAR), and Systems Security Engineering (SSE).
  2. Risk and Vulnerability Assessment: assesses threats and vulnerabilities, determines deviations from acceptable configurations, enterprise or local policy, assesses the level of risk, and develops and/or recommends appropriate mitigation countermeasures in operational and non-operational situations. The services offered in the RVA sub-category include Network Mapping, Vulnerability Scanning, Phishing Assessment, Wireless Assessment, Web Application Assessment, Operating System Security Assessment (OSSA), Database Assessment, and Penetration Testing.
  3. Cyber Hunt: activities respond to crises or urgent situations within the pertinent domain to mitigate immediate and potential threats. Cyber Hunts start with the premise that threat actors known to target some organizations in a specific industry or with specific systems are likely to also target other organizations in the same industry or with the same systems.
  4. Incident Response: services help organizations impacted by a cybersecurity compromise determine the extent of the incident, remove the adversary from their systems, and restore their networks to a more secure state.
  5. Penetration Testing: is security testing in which assessors mimic real-world attacks to identify methods for circumventing the security features of an application, system, or network.

The HACS SIN offers:

Link to GSA IT Schedule 70 HACS SINs Site: