{"id":27,"date":"2026-01-21T20:08:38","date_gmt":"2026-01-21T20:08:38","guid":{"rendered":"https:\/\/encapcybercstg.wpenginepowered.com\/?page_id=27"},"modified":"2026-02-11T18:59:38","modified_gmt":"2026-02-11T18:59:38","slug":"government","status":"publish","type":"page","link":"https:\/\/encapcyber.com\/?page_id=27","title":{"rendered":"Government"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"27\" class=\"elementor elementor-27\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-896ebb5 e-flex e-con-boxed e-con e-parent\" data-id=\"896ebb5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;video&quot;,&quot;background_video_link&quot;:&quot;https:\\\/\\\/encapcyber.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Video-2.mp4&quot;,&quot;background_play_on_mobile&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-background-video-container\">\n\t\t\t\t\t\t\t<video class=\"elementor-background-video-hosted\" role=\"presentation\" autoplay muted playsinline loop><\/video>\n\t\t\t\t\t<\/div>\t\t<div class=\"elementor-element elementor-element-dec8e75 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"dec8e75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Government<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37628fb elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"37628fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Supporting government missions through secure technology.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4252041 e-flex e-con-boxed e-con e-parent\" data-id=\"4252041\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-39e6bd3 e-con-full e-flex e-con e-child\" data-id=\"39e6bd3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cc2c265 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"cc2c265\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Certifications<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0fc6cd2 elementor-widget elementor-widget-text-editor\" data-id=\"0fc6cd2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Certified Information Systems Security Professional (CISSP)<\/span><\/li><li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">GIAC Certified Incident Handler (GCIH)<\/span><\/li><li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">GIAC Security Essentials (GSEC)<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b33b82d elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"b33b82d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Regulatory Compliance &amp; Frameworks<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea53912 elementor-widget elementor-widget-text-editor\" data-id=\"ea53912\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">CMMC, NIST, PCI, ISO2001, ISO42001 and HIPAA<\/span><\/li><li><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">NIST Cybersecurity Framework, Risk Management Framework and CIS Controls<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3d9434 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"a3d9434\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Executive Skills &amp; Competencies<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5c8926 elementor-widget elementor-widget-text-editor\" data-id=\"a5c8926\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Security Leadership:<\/span><\/strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\"> Executive leader responsible for defining and leading Cybersecurity strategic vision, technology selection, roadmap execution, risk management and serve as the executive sponsor for Cybersecurity initiatives across engineering, operations, and regulatory bodies while building and mentoring high-performing security-first teams.<\/span> <span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Operations Officer\u2011in\u2011Charge for Elite Cyber Protection team missions delivering CVA\/H, threat hunting, and mission assurance.<\/span><\/p><p><strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Technology &amp; Architecture: <\/span><\/strong><span class=\"a_GcMg font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Security Engineering | Product Security | Zero Trust | Vulnerability Assessment &amp; Management | Cloud Infrastructure Security | Data Protection &amp; Encryption | Endpoint Detection &amp; Response | AI Security | API Security | Threat Modeling | Dev-Sec-ML-AI-Ops | Secure Architecture Design | Penetration Testing<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7dfc8a4 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"7dfc8a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Owner Past Performance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c39e33 elementor-widget elementor-widget-text-editor\" data-id=\"5c39e33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Lockheed Martin:<\/strong> Navy Aegis Combat System Security, Coast Guard Deepwater System Security, Coast Guard National Security Cutter System Security, Coast Guard Sentinel-Class Cutter System Security<\/p><p><strong>L3 Harris:<\/strong> Navy Ship to Shore Connector secure architecture design, test and delivery, security training for Navy personnel, Coast Guard National Security Cutter System Security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c7383e elementor-mobile-align-justify elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-button\" data-id=\"7c7383e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;bounceIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-float\" href=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/02\/Encapcyber-Capability-Statement-Final_February.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Check Out Our Capability Statement<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-01cd379 e-con-full e-flex e-con e-child\" data-id=\"01cd379\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79f15bb elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"79f15bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Technical Services and Core Competencies<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-064322e elementor-widget elementor-widget-text-editor\" data-id=\"064322e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>CISO-as-a-Service<\/li><li>Vulnerability Scanning &amp; Remediation<\/li><li>Continuous Attack Surface Management<\/li><li>Regulatory Compliance (PCI-DSS, SOC2, HIPAA, SOX)<\/li><li>Security Frameworks (NIST CSF, ISO 27001, CSA)<\/li><li>CMMC Level 1 and 2 Readiness<\/li><li>Policy and Workflow Development<\/li><li>Secure Policy Configuration Management (CIS &amp; STIGS)<\/li><li>Zero Trust Security Integration<\/li><li>Secure Architecture Design and Threat Modeling<\/li><li>Product Security Dev-Sec-ML-AI-Ops<\/li><li>Endpoint Monitoring, Detection and Response<\/li><li>Third Party Security Risk Assessment<\/li><li>C-SCRM Cybersecurity Supply Chain Risk Management<\/li><li>Cloud Security Integration and Migration<\/li><li>IT System Modernization and Administration<\/li><li>Penetration Testing (Red Team)<\/li><li>Security Control Validation Testing<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5743a70 e-flex e-con-boxed e-con e-parent\" data-id=\"5743a70\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48f96d0 elementor-widget__width-auto elementor-invisible elementor-widget elementor-widget-image\" data-id=\"48f96d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/2-1024x576.jpg\" class=\"attachment-large size-large wp-image-38\" alt=\"\" srcset=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/2-1024x576.jpg 1024w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/2-300x169.jpg 300w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/2-768x432.jpg 768w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/2-1536x864.jpg 1536w, https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/2.jpg 1920w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7eec998 e-con-full e-flex e-con e-child\" data-id=\"7eec998\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e584f64 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"e584f64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Government Contracting Codes<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72270ff elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"72270ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>UEI:<\/strong> TWB7WLF1L8K9\u00a0 |\u00a0 <strong>CAGE:<\/strong> 17NX1\u00a0 |\u00a0 <strong>DUNS:<\/strong> 144899240<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2ee9be elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"b2ee9be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>NAICS:<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-697304a elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"697304a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>541511 \u2013<\/strong> Custom Computer Programming Services<br \/><strong>541512 \u2013<\/strong> Computer Systems Design Services<br \/><strong>541519 \u2013<\/strong> Other Computer Related Services<br \/><strong>541611 \u2013<\/strong> Administrative Management &amp; General Management Consulting Services<br \/><strong>541614 \u2013<\/strong> Process, Physical Distribution, and Logistics Consulting Services<br \/><strong>541618 \u2013<\/strong> Other Management Consulting Services<br \/><strong>541715 \u2013<\/strong> Research and Development in the Physical, Engineering, and Life Sciences (except Nanotechnology &amp; Biotechnology)<br \/><strong>541690 \u2013<\/strong> Other Scientific and Technical Consulting Services<br \/><strong>541990 \u2013<\/strong> All Other Professional, Scientific, and Technical Services<br \/><strong>518210 \u2013<\/strong> Data Processing, Hosting, and Related Services<br \/><strong>611430 \u2013<\/strong> Professional and Management Development Training<br \/><strong>561621 \u2013<\/strong> Security Systems Services (except Locksmiths)<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Government Supporting government missions through secure technology. Certifications Certified Information Systems Security Professional (CISSP) GIAC Certified Incident Handler (GCIH) GIAC Security Essentials (GSEC) Regulatory Compliance &amp; Frameworks CMMC, NIST, PCI, ISO2001, ISO42001 and HIPAA NIST Cybersecurity Framework, Risk Management Framework and CIS Controls Executive Skills &amp; Competencies Security Leadership: Executive leader responsible for defining and [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-27","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Government - EncapCyber<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/encapcyber.com\/?page_id=27\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Government - EncapCyber\" \/>\n<meta property=\"og:description\" content=\"Government Supporting government missions through secure technology. Certifications Certified Information Systems Security Professional (CISSP) GIAC Certified Incident Handler (GCIH) GIAC Security Essentials (GSEC) Regulatory Compliance &amp; Frameworks CMMC, NIST, PCI, ISO2001, ISO42001 and HIPAA NIST Cybersecurity Framework, Risk Management Framework and CIS Controls Executive Skills &amp; Competencies Security Leadership: Executive leader responsible for defining and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/encapcyber.com\/?page_id=27\" \/>\n<meta property=\"og:site_name\" content=\"EncapCyber\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-11T18:59:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/encapcyber.com\\\/?page_id=27\",\"url\":\"https:\\\/\\\/encapcyber.com\\\/?page_id=27\",\"name\":\"Government - EncapCyber\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/encapcyber.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/encapcyber.com\\\/?page_id=27#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/encapcyber.com\\\/?page_id=27#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/encapcyber.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/2-1024x576.jpg\",\"datePublished\":\"2026-01-21T20:08:38+00:00\",\"dateModified\":\"2026-02-11T18:59:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/encapcyber.com\\\/?page_id=27#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/encapcyber.com\\\/?page_id=27\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/encapcyber.com\\\/?page_id=27#primaryimage\",\"url\":\"https:\\\/\\\/encapcyber.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/2.jpg\",\"contentUrl\":\"https:\\\/\\\/encapcyber.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/2.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/encapcyber.com\\\/?page_id=27#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/encapcyber.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Government\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/encapcyber.com\\\/#website\",\"url\":\"https:\\\/\\\/encapcyber.com\\\/\",\"name\":\"EncapCyber\",\"description\":\"AI-Powered Protection for Modern Threats\",\"publisher\":{\"@id\":\"https:\\\/\\\/encapcyber.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/encapcyber.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/encapcyber.com\\\/#organization\",\"name\":\"EncapCyber\",\"url\":\"https:\\\/\\\/encapcyber.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/encapcyber.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/encapcyber.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/encapcyber_logo-scaled.png\",\"contentUrl\":\"https:\\\/\\\/encapcyber.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/encapcyber_logo-scaled.png\",\"width\":1765,\"height\":2560,\"caption\":\"EncapCyber\"},\"image\":{\"@id\":\"https:\\\/\\\/encapcyber.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Government - EncapCyber","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/encapcyber.com\/?page_id=27","og_locale":"en_US","og_type":"article","og_title":"Government - EncapCyber","og_description":"Government Supporting government missions through secure technology. Certifications Certified Information Systems Security Professional (CISSP) GIAC Certified Incident Handler (GCIH) GIAC Security Essentials (GSEC) Regulatory Compliance &amp; Frameworks CMMC, NIST, PCI, ISO2001, ISO42001 and HIPAA NIST Cybersecurity Framework, Risk Management Framework and CIS Controls Executive Skills &amp; Competencies Security Leadership: Executive leader responsible for defining and [&hellip;]","og_url":"https:\/\/encapcyber.com\/?page_id=27","og_site_name":"EncapCyber","article_modified_time":"2026-02-11T18:59:38+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/2.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/encapcyber.com\/?page_id=27","url":"https:\/\/encapcyber.com\/?page_id=27","name":"Government - EncapCyber","isPartOf":{"@id":"https:\/\/encapcyber.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/encapcyber.com\/?page_id=27#primaryimage"},"image":{"@id":"https:\/\/encapcyber.com\/?page_id=27#primaryimage"},"thumbnailUrl":"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/2-1024x576.jpg","datePublished":"2026-01-21T20:08:38+00:00","dateModified":"2026-02-11T18:59:38+00:00","breadcrumb":{"@id":"https:\/\/encapcyber.com\/?page_id=27#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/encapcyber.com\/?page_id=27"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/encapcyber.com\/?page_id=27#primaryimage","url":"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/2.jpg","contentUrl":"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/2.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/encapcyber.com\/?page_id=27#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/encapcyber.com\/"},{"@type":"ListItem","position":2,"name":"Government"}]},{"@type":"WebSite","@id":"https:\/\/encapcyber.com\/#website","url":"https:\/\/encapcyber.com\/","name":"EncapCyber","description":"AI-Powered Protection for Modern Threats","publisher":{"@id":"https:\/\/encapcyber.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/encapcyber.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/encapcyber.com\/#organization","name":"EncapCyber","url":"https:\/\/encapcyber.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/encapcyber.com\/#\/schema\/logo\/image\/","url":"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/encapcyber_logo-scaled.png","contentUrl":"https:\/\/encapcyber.com\/wp-content\/uploads\/2026\/01\/encapcyber_logo-scaled.png","width":1765,"height":2560,"caption":"EncapCyber"},"image":{"@id":"https:\/\/encapcyber.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/encapcyber.com\/index.php?rest_route=\/wp\/v2\/pages\/27","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/encapcyber.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/encapcyber.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/encapcyber.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/encapcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=27"}],"version-history":[{"count":0,"href":"https:\/\/encapcyber.com\/index.php?rest_route=\/wp\/v2\/pages\/27\/revisions"}],"wp:attachment":[{"href":"https:\/\/encapcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=27"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}