
Cyber Operations
Accelerating cybersecurity in a changing world
Emerging threats require innovative cyber protection
Leidos redefines the benchmark with our next-level cyber solutions. With our AI-Driven Cyber Defense and Leidos Cyber Framework, we move beyond mere response; we anticipate, adapt, and act preemptively. These solutions embody the essence of advanced intelligence, transforming traditional cyber defense into a proactive, resilient, and adaptive strategy. By choosing Leidos, you're not just adapting to the future; you're actively shaping it with the smartest cyber resilience solutions available today.
Full-spectrum Cyber solutions include offensive, defensive, and cyber physical systems. We drive new advances for our customers in the areas of Zero Trust, Cognitive Cyber, Quantum, Identity, Credential, and Access Management (ICAM), and more.
AI has upended cybersecurity. Only AI can fight back.
Artificial intelligence tools are completely changing how adversaries plan and perpetrate cyber attacks, and U.S. companies and government agencies are prime targets for these new assaults. AI-powered cyber threats is the top concern for senior risk executives and managers, according to a survey by Gartner, a top research and consulting firm. To defend against these emerging threats, we must turn to AI-enabled cyber defenses. Meghan Good, senior vice president of technology integration, explains.
Scaling Cyber Warfare: Insights on the Future of Defense and Offense
Exploring cyber defense in a digital age
Discover how AI is transforming cybersecurity with Meghan Good, senior vice president of technology integration, and Bobby Scharmann, software engineer. This conversation highlights the intersection of AI, software, and cybersecurity, showcasing how these elements combine to tackle evolving threats with precision and resilience. Gain valuable insights into the transformative impact of these technologies on securing the future of digital operations.
The Zero Trust journey: Architecting today for tomorrow’s technologies
Leidos Cybersecurity thought leaders David Thurmond and Jesse Peoples discuss the challenges that come with Zero Trust adoption, as well as how capabilities such as Post-Quantum Cryptography and Generative AI can contribute to an organization’s architecture.
‘We have to find talent’: Cyber leaders push for skills-based hiring
One advocate of skills-based hiring says employers need to stop looking for 'unicorns' and invest more in hands-on training to fill cyber skills gaps. Lynsey Caldwell, cybersecurity workforce program director discusses ways to improve cyber hiring.
Quantum Technologies
Quantum technologies offer critical advantages to inaccessible classical technologies. Collaboration with Leidos’ recognized leaders in cybersecurity, digital modernization, intelligence, defense, AI/ML, and software drives multi-disciplinary innovation with emerging quantum technologies to build practical solutions for our customer’s challenges.

Zero Trust Architectures
Zero Trust is a concept that challenges traditional cybersecurity thinking. It assumes that networks are either actively under attack or already breached.

Security Operations Centers (SOC to SIC)
PACKIT™ (Proven, Analytic-Centric Kill Chain Implementation and Transformation) is our threat-based approach to conducting and improving cyber defense. PACKIT leverages people, process and technology to operationalize and implement an analytical framework (i.e., kill-chains) to improve an organization’s cybersecurity posture.

Cyber Resiliency
As a company, we design, build, and deploy valuable assets – IT, data systems, networks, or platforms – for our customers. Using our cyber expertise, we continually enhance our techniques and processes to build systems that operate resiliently in the face of evolving cyber threats. We put hardware and software to the test – through penetration testing, reverse engineering, adversarial simulations and assessments – to identify gaps in security and develop the best solutions for our customers’ systems.

Risk Management Framework
Security, at its core, is a risk analysis and management activity. This starts with a successful system authorization to operate (ATO) and proper alignment to the risk management framework (RMF). In addition to expertise, Leidos' Risk and Privacy Management Acceleration Playbook (RAPMAP) is a repeatable playbook to implementing the RMF, where best practice tools, templates, and techniques are provided to our customers.

Cyber Analytics
Our Foundational Automation Support Technology (FAST) framework is an innovative approach to automatically discover and track all IP-addressable network devices — reducing manual, labor-intensive processes like asset inventory. This approach facilitates a configuration management database (CMDB) and incorporates AI and machine learning to understand event relationships better and perform predictive analytics between events.

Cybersecurity
Keeping pace with the Federal Information Security Modernization act is vital for every company. To help, Leidos developed IonIA™, a product that helps you determine what is reportable under FISMA. IonIA ensures you're adhering to FISMA by defining, maintaining, and repetitively monitoring your systems through every security layer.

Insider Threat
Our risk-based services integrate both technical and non-technical system elements for a truly holistic defense against insider threats. Using anomaly detection and analytics, we identify unusual activity based on peers, time of day, and previous activity and correlate this activity with external risk factors to produce a weighted risk score and prioritize internal investigations. Our proven solutions can complement existing technical tools or be deployed independently.

Accredited Testing & Evaluation
The Leidos Accredited Testing and Evaluation (AT&E) Lab is accredited by the National Institute of Standards and Technology (NIST) NVLAP Program (Lab code 200427-0). As the industry volume leader, our AT&E Lab has certified more than 1000 IT security products across 100+ commercial product vendors since 2000, including Microsoft, Hewlett Packard Enterprise, Dell, Cisco, and Symantec.
