Cyber Test & Evaluation


Today’s cyber-contested environment demands cradle to grave testing and evaluation for military systems. Doing so helps to discover and remediate vulnerabilities during development – saving time and money later in the lifecycle of the technology. It also maintains that technology’s resiliency to the inevitable cyberattack throughout its operational lifetime.

At Lockheed Martin, we have proven tools, processes, and expertise to test and evaluate military systems against the ever-evolving cyber threats. Moreover, we have over a decade of experience through our support of the United States’ Test Resource Management Center’s National Cyber Range (NCR). The range gives government organizations insights into how well their existing information technologies can meet the demands of a rapidly evolving cybersecurity landscape. Because the NCR is secure and can be scaled in size, users can answer their critical cyber questions quickly, accurately, and safely at a fraction of the cost when compared to building and operating a similar privately-owned capability.

Available evaluations for cyber and mission impact

Acquisition Program Testing

Acquisition Program Testing

System of System Testing

System of System Testing

Hardware in the Loop

Hardware in the Loop

Reliable Mission Effectiveness Data

Reliable Mission Effectiveness Data

Cyber Table Tops

Cyber Table Tops

Proven Experience

Using Cyber Table Tops

We’re constantly generating new processes and procedures that programs and government agencies can use to test and evaluate the cybersecurity of the technology. One prime example is the Cyber Table Top (CTT) process. In collaboration with TRMC, we developed the process that applies war-gaming to identify high risk cyber threats to systems. These CTTs consider electronic warfare, supply chains, and other factors beyond cyber, and often focus on the interplay between these domains. The CTT process has been published in an ITEA Journal and adopted as a NAVAIR best practice, and by the Office of the Secretary of Defense DT&E as a key cyber resilience assessment tool.
Built in, Not Bolted on
Latest News   ___
Feb 19, 2024
Story
The DIB Sector Coordinating Council is implementing a new common and simplified assessment model for evaluating supplier cyber posture (CCRA).
Jan 12, 2024
Story
Critical zero-day exploits have been discovered in Ivanti Connect Secure (ICS), formerly known as Pulse Connect Secure and Ivanti Policy Secure Gateways.
Oct 19, 2023
Press Release
The U.S. Army Contracting Command – Orlando, has selected Lockheed Martin for Event Planning, Operations and Support (EPOS) at the National Cyber Range Complex (NCRC) site at Joint Base Charleston in Hanahan, South Carolina.
Contacts   ___