What should you look for in a cyber security assessment? Find out with our checklist. Download Now

Latest
Blog Posts

Guide: Best Practices for Data Protection

Hackers are trying to access your critical data systems. Learn the best practices for protecting your organization’s sensitive information.

Download Now

Client
Testimonials

  • Jim Robb

    System Wide Information Management Program Manager, Requirements and Governance Federal Aviation Administration

    "As your team knows, the SWIM program is one of the seven transformational programs for NextGen.  As we come to the anniversary of another year of support to SWIM delivery of NEXTGEN capabilities …”

    Learn More
  • Sandra Anderson

    Communications Program Manager Federal Aviation Administration

    "North Star delivers high quality products on time. North Star also provides solid support in the development of a risk adjusted integrated master schedule covering a wide scope, a long …”

    Learn More
  • Duncan Booth

    Assistant Head, Finance and Operations Roland Park Country School

    “The analysis provided by the COMPASS security team gave us a remediation roadmap that will enable RPCS to prioritize the tasks necessary to significantly and cost effectively improve our security …”

    Learn More
View All