We take pride in defending the IT systems and network foundations of your critical services.

Public Sector Information Security

Governments manage critical infrastructure for the citizens they serve. From water purification and waste treatment to law enforcement communication and emergency management, governments play a critical role in our day-to-day lives. The high-impact nature of these services makes the technologies behind the services key targets for hacktivists, insiders, organized criminals and nation-states.

Critical Informatics has a proven record of protecting the data, networks, and systems of local governments. Through our managed cybersecurity services and consulting, we become an extension of our customers’ teams and technologies, providing them affordable access to security practitioners.

Both of our core services, Managed Detection and Response (MDR) and Information Security Consulting, target three basic goals: data security and privacy, operational continuity and regulatory compliance.

Sign up for our weekly Public Sector Briefing to stay up to date on information security news that you need to know. 

We may also occasionally send you information about Critical Informatics products and solutions; you can unsubscribe at any time if desired.

“Critical Informatics served a pivotal role as the City positioned itself to receiving a successful (PCI) Level 1 Report of Compliance.”

– Teri Allen, Treasury Manager, City of Seattle

Managed Detection and Response

Our Managed Detection and Response (MDR) service provides local governments with both the technology and human expertise to detect, investigate, respond, and recover from IT security threats and prevent major breaches. Critical Informatics helps maritime ports, local and county governments, public utilities and other local government organizations avoid disruption of critical services in a world of quickly-evolving threats.

Our algorithms process network event data to identify:

  • Statistical anomalies
  • Interaction with known malware distribution or criminal command and control sites
  • Signature-based events from the intrusion detection Critical Insight Collector
  • Correlation of multiple suspicious events
  • Significant periodicity in signals

Utilizing elastic scalability and advanced data indexing algorithms, we are limited only by the amount of data you can provide to us. We grow as large as we need to be, and we do not lose processing capabilities as we scale. Our learning approach allows Critical Insight to become continuously more powerful, accurate and faster as data is ingested and processed.

Our promise to you is to only provide actionable alerts, not false positives. Our security experts investigate each incident to confirm which are true threats. Once confirmed, the analyst prepares and communicates a customized Incident Action Plan (IAP) and interfaces with your staff in a pre-designed incident response process to quickly address the compromise. Incidents are addressed quickly so that actual damage and loss are averted or minimized. This process eliminates false positives and gives you an actionable plan for confirmed threats.

The availability of full packet capture at the collector allows our analysts to “replay” events under investigation for 100% incident confirmation and 0 false positives while ensuring only incidental access to sensitive information. Once an incident has been confirmed, we can go “back in time” and determine if any other compromises occurred prior. We can replay all that happened, often down to the mouse-click.

Contact us to learn more about integrating our MDR Service into your cybersecurity strategy.

Information Security Consulting

Local governments are regulated by multiple regulatory like PCI, HIPAA and CJIS. In the common interest of protecting sensitive information, governments must comply with a broad set of security requirements. In addition to our Managed Security Services, we offer our public sector clients a full set of cybersecurity consulting services that ensure regulatory compliance. These services include:

  • Information Security Assessment
  • Wireless Security Assessments
  • Social Engineering Assessments
  • Penetration Testing/Ethical Hacking
  • IoT, Smart Cities, SCADA, PLC and ICS/DCS Security and Device Testing
  • Threat Intelligence Program Development

You look out for our future, we want to help you plan for yours. 

We understand the competitive procurement process from our extensive public sector experience, and we offer executive briefings to help with future planning.

Our public sector team is led by our Founder and President, Michael K. Hamilton.

Michael has 25 years of experience in information security, as a practitioner, consultant, executive and entrepreneur. As former Chief Information Security Officer for the City of Seattle, Michael managed information security policy, strategy, and operations for 30 government agencies. Prior, Michael was the Managing Consultant for VeriSign Global Security Consulting and in that role provided expertise for hundreds of organizations, from Fortune 100 to small private colleges, and in nearly every sector. Michael is a subject-matter expert and former Vice-Chair for the DHS State, Local, Tribal and Territorial Government Coordinating Council. His awards include Member of the Year with the Association of City and County Information Systems (ACCIS), and Collaboration Award from the Center for Digital Government. Michael recently served as a Policy Advisor for the State of Washington Office of the CIO, and continues to spearhead the Public Infrastructure Security Collaboration and Exchange System (PICSES), a regional cyber event monitoring system that is unique in the nation. Michael has been a member of the Sigma Xi research honor society for more than 25 years.

Past Public Sector News Blasts

June 15, 2018

Public Sector Cybersecurity Weekly Briefing 06-15-2018

[EVENT] Municipal Cyber Security Workshop in Bothell, WA Join Mike Hamilton on June 21st in Bothell, WA, for a co-hosted event with Ogden Murphy Wallace on […]
June 8, 2018

Public Sector Cybersecurity Weekly Briefing 06-08-2018

Collaboration to Protect Critical Government Infrastructure Reboots, Eyes National Expansion Starting in Washington state, the project — called the Public Infrastructure Security Collaboration and Exchange System, […]
May 31, 2018

Public Sector Cybersecurity Weekly Briefing 06-01-2018

Senate Defense Bill Aims to Scrub Cyber Adversaries from U.S. Military Tech The Senate version of the 2019 National Defense Authorization Act explicitly bars the Chinese […]
May 25, 2018

Public Sector Cybersecurity Weekly Briefing 05-25-2018

South Carolina Enacts First Insurance Data Security Act The South Carolina Act will require all insurers, agents and other licensed entities doing business in the state […]
May 18, 2018

Public Sector Cybersecurity Weekly Briefing 05-18-2018

‘Smart’ Meters in Washington State: Convenience or Potential Invasion of Privacy? Every six hours, James Dean’s office gets a report on how much water Yakima residents […]
May 11, 2018

Public Sector Cybersecurity Weekly Briefing 05-11-2018

Mark Your Calendar! Hack Timing Patterns Companies and governments know they are targets for people looking to cause harm or profit by attacking their networks. Those […]

Critical Informatics and the Critical Informatics logo are the trademarks of Critical Informatics, Inc.
All other brand names, trademarks, service marks
 and copyrights are the property of their respective owners.

© 2017 Critical Informatics, Inc. All Rights Reserved.