New Name, Same Exceptional Service! Introducing Lockstep Technology Group

Transformyx: A Lockstep Technology Group Company
Edit Current Layout

CISA Analysis: FY2020 Risk and Vulnerability Assessments

Ned Fasullo • Jul 12, 2021

CISA Analysis: FY2020 Risk and Vulnerability Assessments

Each year, the Cybersecurity and Infrastructure Security Agency (CISA) conducts Risk and Vulnerability Assessments (RVAs) of Federal Civilian Executive Branch (FCEB), Critical Infrastructure (CI), and State, Local, Tribal, and Territorial (SLTT) stakeholders. An RVA assesses an organization's overall effectiveness in identifying and addressing network vulnerabilities. In Fiscal Year 2020 (FY20), CISA conducted 37 RVA assessments of multiple stakeholders across the various sectors and aligned the results to the MITRE ATT&CK® framework. The goal of the RVA analysis is to develop effective strategies that positively impact the security posture of FCEB, SLTT, and CI stakeholders.


During an RVA, CISA collects data through onsite assessments and combines it with national threat and vulnerability information to provide an organization with actionable remediation recommendations prioritized by risk. CISA designed RVAs to identify vulnerabilities that adversaries could exploit to compromise network security controls. An RVA may incorporate the following methodologies:

  • Scenario-based network penetration testing
  • Web application testing
  • Social engineering testing
  • Wireless testing
  • Configuration reviews of servers and databases
  • Detection and response capability evaluation


After completing the RVA, CISA provides the organization a final report that includes business executive recommendations, specific findings, potential mitigations, and technical attack path details.


CISA’s RVA teams leverage the MITRE ATT&CK framework, which is a “globally accessible knowledge base of adversary tactics and techniques based on real-world observations.”1 The framework aims to build a community-driven knowledge base—comprising known tactics, techniques, and procedures (TTPs) of threat actors—to help develop threat models and facilitate vulnerability mitigation efforts. The framework includes 14 distinct attack paths that cyber adversaries use to obtain and maintain unauthorized access to a network/system.

CISA Analysis - FY2020 Risk & Vulnerability Assessments - July 2021

Ned Fasullo, Manager, Mid-Market Division

For more information:

Email us | Sales@tfmx.com

Call us | 225.761.0088 ext 112


By Ivana Rhodes 19 Dec, 2023
Increasing Efficiency Through Cloud Managed Meraki SD-WAN & Security
By Ivana Rhodes 09 Aug, 2023
Announcing ProComputing to the Lockstep Technology Group Brand!
09 Jun, 2023
Introducing Lockstep: Keeping You a Step Ahead of the Technology Curve
16 Mar, 2022
Lockstep Technology Group, a leading provider of technology solutions for SLED organizations, is adding Transformyx, a leader in technology infrastructure and managed services, to become the leading full-service provider of IT solutions and services focused exclusively on optimizing the IT strategies of organizations in the education, healthcare, government, and commercial sectors across the Southeast. Lockstep and Transformyx share a common purpose to provide technology solutions that enable a robust, scalable, innovative, secure, and highly engaging environment for working and learning. With combined resources, Lockstep, based in Atlanta, GA and Greenville, SC, and Transformyx, based in Baton Rouge, LA, will strengthen their market positions in the Southeast and offer their clients turn-key solutions that include managed services, data & infrastructure, security & compliance, and end point technology solutions. Both organizations take pride in being customer-centric and client obsessed and have partnered with thousands of organizations spanning schools, colleges, healthcare, municipalities, and business over the past decade. “The passion and purpose embodied by the Transformyx team align with everything we do at Lockstep. We’re excited to be able to immediately offer a wide range of technology solutions that enable success.” Mahendran Jawaharlal, CEO, Lockstep Technology Group.
02 Mar, 2022
ASA Powered Managed Security Services
By Ned Fasullo 23 Sep, 2021
During a 2020 study on IT decision makers and C-level executives at enterprise organizations, it was found that 64 percent of respondents believed that those in a senior management positions are the most likely to be targeted by malicious cyber attacks within their organizations. In contrast, only 34 percent of respondents reported freelance support positions as being most likely to be targeted.
By Ned Fasullo 23 Sep, 2021
According to data collected throughout 2020, the most widespread type of mobile malware worldwide were variants from the Agent Tesla family. This accounted for nearly 30 percent of all mobile malware attacks that year. Formbook malware was the second most common type found, followed by those from the family LokiBot.
By Ned Fasullo 23 Sep, 2021
According to data collected throughout 2020, the most prevalent malware threats to corporate networks across the globe that year were from the malware family Emotet, representing 19 percent of all reported attacks. The second highest number of attacks came from the Agent Tesla malware family, followed by Dridex variants.
By Ned Fasullo 23 Sep, 2021
In 2020, the majority of reported botnet attacks globally was caused by malware from the Emotet family. This represented over 30 percent of all attacks. Although an additional 15 and 14 percent of botnet crime was traced to Dridex and Trickbot respectively, 17 percent of attacks that year involved malware from other families.
By Ned Fasullo 23 Sep, 2021
Malware - Statistics & Facts
More Posts
Share by: