Cyber Test & Evaluation


Today’s cyber-contested environment demands cradle to grave testing and evaluation for military systems. Doing so helps to discover and remediate vulnerabilities during development – saving time and money later in the lifecycle of the technology. It also maintains that technology’s resiliency to the inevitable cyberattack throughout its operational lifetime.

At Lockheed Martin, we have proven tools, processes, and expertise to test and evaluate military systems against the ever-evolving cyber threats. Moreover, we have over a decade of experience through our support of the United States’ Test Resource Management Center’s National Cyber Range (NCR). The range gives government organizations insights into how well their existing information technologies can meet the demands of a rapidly evolving cybersecurity landscape. Because the NCR is secure and can be scaled in size, users can answer their critical cyber questions quickly, accurately, and safely at a fraction of the cost when compared to building and operating a similar privately-owned capability.

Available evaluations for cyber and mission impact

Acquisition Program Testing

Acquisition Program Testing

System of System Testing

System of System Testing

Hardware in the Loop

Hardware in the Loop

Reliable Mission Effectiveness Data

Reliable Mission Effectiveness Data

Cyber Table Tops

Cyber Table Tops

Proven Experience

Using Cyber Table Tops

We’re constantly generating new processes and procedures that programs and government agencies can use to test and evaluate the cybersecurity of the technology. One prime example is the Cyber Table Top (CTT) process. In collaboration with TRMC, we developed the process that applies war-gaming to identify high risk cyber threats to systems. These CTTs consider electronic warfare, supply chains, and other factors beyond cyber, and often focus on the interplay between these domains. The CTT process has been published in an ITEA Journal and adopted as a NAVAIR best practice, and by the Office of the Secretary of Defense DT&E as a key cyber resilience assessment tool.
Latest News   ___
Cyber/CMMC Level 1 & 2 Training Available
Mar 24, 2023
Story
This training is self-paced and intended for a range of roles and responsibilities including from organizations seeking certification and CMMC compliance.
Multi-Factor Authentication Implementation
Feb 15, 2023
Story
Enforcing MFA is far more than an issue of compliance, it is perhaps the most critical control in protecting critical customer missions.
Mitigating Supply Chain Counterfeit Risks
Nov 30, 2022
Story
Mitigating Supply Chain Counterfeit Risks
Contacts   ___