HEX
Server: Apache/2.4.52 (Ubuntu)
System: Linux spn-python 5.15.0-89-generic #99-Ubuntu SMP Mon Oct 30 20:42:41 UTC 2023 x86_64
User: arjun (1000)
PHP: 8.1.2-1ubuntu2.20
Disabled: NONE
Upload Files
File: /var/www/html/TriadGov/wp-content/themes/triad-gov/page-service.php
<?php /* Template Name: Services Page */
get_header();
?>

<section class="sub-banner service">
    <div class="container custom-container">
        <div class="inner-banner">
            <div class="inner-content">
                <h1 class="main-title">
                    Your Trusted <br> <span class="green-color">Cybersecurity Partner for<br> Government Agencies</span>
                </h1>
                <div class="bottom-sec">
                    <button class="learn-btn1" onclick="window.location.href='<?php echo site_url('/contact-us'); ?>'">Contact Triad GovSec</button>
                </div> 
            </div>
            <div class="bnr-rt">
                <img src="<?php echo get_template_directory_uri(); ?>/img/servic_banner.png" alt="banner image">
            </div>
           
        </div>
      
    </div>
</section>
<section class="our-vision">
    <div class="container custom-container">
        <div class="row vision-inner">
            <div class="lef-content">
                <div class="vision-title">Our Services
                </div>
                <div class="content-inner">
                    <p class="sub-title">At Triad GovSec, we provide a full spectrum of cybersecurity solutions designed to protect government agencies from ever-evolving cyber threats. Our services ensure compliance, enhance operational resilience, and strengthen national security.

                        
                        </p>
                    <p class="sub-title">Whether you need strategic advisory, advanced threat detection, or incident response, we have the expertise to deliver mission-critical cybersecurity solutions.
                    </p>
                 </div>
            </div>
            <div class="vision-img">
                <img src="<?php echo get_template_directory_uri(); ?>/img/our_srvices.png" alt="who-we-are">
            </div>
        </div>
    </div>
</section>




<section class="cybersecurity-section">
    <div class="container custom-container">
        <div class="row cyber-security-inner">
            <div class="col-lg-4 info-inner-lt">
                <div class="info-card ">
                    <h3 class="info-title">Cybersecurity Consulting</h3>
                    <p class="info-content">Government agencies need more than recommendations—they need resilient strategies built around mission and compliance.
                    Triad GovSec provides the depth of insight and strategic foresight needed to secure today’s operations and tomorrow’s innovations.</p>
                </div>
            </div>
            <div class="col-lg-8 info-inner-rt">
                <div class="info-list">
                    <div class="info-item">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Risk & Compliance Assessments</h5>
                            <p class="info-content">We evaluate your systems against NIST, CMMC, FISMA, and FedRAMP standards, identifying gaps before they become liabilities.
                            You’ll receive a clear, prioritized roadmap tailored to your unique operational needs.
                            From findings to fixes—we’ve got your six.
                            Risk doesn’t wait. Neither do we.</p>
                        </div>
                    </div>
                    <div class="info-item">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Cybersecurity Strategy & Roadmap</h5>
                            <p class="info-content">We build security roadmaps that align with your mission, operations, and evolving threat landscape.
                                Our strategic plans address immediate gaps and long-term goals with a phased, actionable approach.
                                No more guesswork—just focused momentum.
                                This is vision backed by execution.</p>
                        </div>
                    </div>
                    <div class="info-item">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Identity & Access Management (IAM)</h5>
                            <p class="info-content">We harden identity systems with MFA, SSO, and role-based access controls that prevent unauthorized access.
                            Whether managing users, contractors, or privileged accounts, we close the doors adversaries love.
                            IAM is your perimeter—we make it impenetrable.
                            Only the right people, with the right access, every time.</p>
                        </div>
                    </div>
                    <div class="info-item ">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Data Governance & Privacy</h5>
                            <p class="info-content">Protecting sensitive data means more than encryption—it requires policy, process, and oversight.
                                We develop and enforce governance frameworks to secure critical assets and meet privacy mandates.
                                Data is your most valuable resource—we ensure it’s defended.
                                Confidential stays confidential—with us, always.</p>
                        </div>
                    </div>
                    <div class="info-item">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Supply Chain Security</h5>
                            <p class="info-content">Third-party risk is first-order risk in today’s threat landscape.
                                We assess vendor ecosystems, validate controls, and reduce exposure from outside actors.
                                Whether it’s IT providers or OT contractors, we secure your entire supply chain.
                                Trust but verify—and then fortify.</p>
                        </div>
                    </div>
                    <div class="info-item ">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Cloud Security Architecture & Migration</h5>
                            <p class="info-content">We help agencies move to the cloud securely—designing hardened architectures from the ground up.
                                From FedRAMP alignment to cloud-native threat detection, your migration is safe in our hands.
                                We don’t just lift-and-shift—we fortify and future-proof.
                                Cloud smart starts here.</p>
                        </div>
                    </div>
                    <div class="info-item ">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Policy & Procedure Development</h5>
                            <p class="info-content">We write and update cybersecurity policies in alignment with NIST frameworks and operational realities.
                            From AUPs to BCPs, we ensure documentation is practical, current, and audit-ready.
                            Clarity on paper leads to action in practice.
                            We don’t just draft—we drive adoption.</p>
                        </div>
                    </div>
                    <div class="info-item ">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">AI & Emerging Tech Risk Advisory</h5>
                            <p class="info-content">We help agencies assess and secure emerging technologies like AI, IoT, and quantum systems.
                                From model risk assessments to securing edge devices—we see the future and protect against it.
                                Innovation shouldn’t outpace security.
                                We bring governance to the cutting edge.</p>
                        </div>
                    </div>
                </div>
            </div>
        </div>
    </div>
</section>



<section class="cybersecurity-section col-change">
        <div class="container custom-container">
            <div class="row cyber-security-inner">
                <div class="col-lg-4 info-inner-lt">
                    <div class="info-card ">
                        <h3 class="info-title">Advanced Threat 
                            Detection & Response</h3>
                        <p class="info-content">Modern threats don’t rest—and neither do we.
                        Triad GovSec delivers proactive threat detection, real-time response, and relentless cyber defense.</p>
                    </div>
                </div>
                <div class="col-lg-8 info-inner-rt">
                    <div class="info-list">
                        <div class="info-item">
                            <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                            <div class="content-inner">
                                <h5 class="info-title">Threat Intelligence & Hunting</h5>
                                <p class="info-content">We leverage global threat intel, behavioral analytics, and proactive hunting to surface hidden threats.
                                    Our analysts detect anomalies before alerts go off.
                                    It’s not enough to respond fast—we prevent smarter.
                                    The threat is active. So are we.</p>
                            </div>
                        </div>
                        <div class="info-item">
                            <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                            <div class="content-inner">
                                <h5 class="info-title">Security Operations Center (SOC) Services</h5>
                                <p class="info-content">24/7 monitoring, log analysis, and incident response—your agency is never unguarded.
                                    Our SOC protects networks, endpoints, and users with eyes-on-glass vigilance.
                                    From escalation to resolution, we own the timeline.
                                    You sleep—we defend.</p>
                            </div>
                        </div>
                        <div class="info-item">
                            <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                            <div class="content-inner">
                                <h5 class="info-title">Endpoint Security Solutions</h5>
                                <p class="info-content">We lock down devices with real-time EDR, malware protection, and behavioral controls.
                                    From workstations to SCADA systems, every endpoint is shielded.
                                    No device left behind.
                                    Every surface, every time.</p>
                            </div>
                        </div>
                        <div class="info-item ">
                            <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                            <div class="content-inner">
                                <h5 class="info-title">Zero Trust Security Framework </h5>
                                <p class="info-content">We implement strict verification policies, microsegmentation, and continuous authentication.
                                Access is no longer assumed—it’s earned, constantly.
                                Zero trust isn't a buzzword here—it's our blueprint.
                                Inside or outside the firewall, nothing moves unchecked.</p>
                            </div>
                        </div>
                        <div class="info-item ">
                            <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                            <div class="content-inner">
                                <h5 class="info-title">Deception Technology / Honeypots</h5>
                                <p class="info-content">We deploy digital traps to lure, detect, and analyze attackers inside your environment.
                                These decoys provide early warning without risk to production systems.
                                Let the attackers make the first move—we’ll already be watching.
                                We weaponize their curiosity.</p>
                            </div>
                        </div>
                        <div class="info-item ">
                            <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                            <div class="content-inner">
                                <h5 class="info-title">Network Behavior Anomaly Detection (NBAD)</h5>
                                <p class="info-content">We detect advanced threats through subtle deviations in traffic and usage patterns.
                                Even unknown threats can’t hide from behavioral analytics.
                                No signatures needed—just smart detection.
                                You’ll know something’s wrong before damage is done.</p>
                            </div>
                        </div>
                        <div class="info-item ">
                            <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                            <div class="content-inner">
                                <h5 class="info-title">Threat Modeling & Adversary Simulation</h5>
                                <p class="info-content">We simulate how nation-state and cybercriminal actors might attack your agency.
                                    By understanding their methods, we strengthen your defenses strategically.
                                    Plan for war—even during peace.
                                    We train like it’s real—because someday it will be.</p>
                            </div>
                        </div>
                    </div>
                </div>
            </div>
    </div>
</section>


<!-- <section class="cybersecurity-section threat-bg">
    <div class="container custom-container">
        <div class="row cyber-security-inner">
            <div class="col-lg-4 info-inner-lt">
                <div class="info-card ">
                    <h3 class="info-title">Advanced Threat Detection & Response</h3>
                    <p class="info-content">Our cutting-edge threat detection and response services empower government agencies to identify and neutralize cyber threats before they can cause harm.
                    </p>
                </div>
            </div>
            <div class="col-lg-8 info-inner-rt">
                <div class="info-list">
                    <div class="info-item">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Threat Intelligence & Hunting</h5>
                            <p class="info-content">Proactively detect and mitigate cyber threats using 
                                advanced analytics.                                    
                            </p>
                        </div>
                    </div>
                    <div class="info-item">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Security Operations Center (SOC) Services</h5>
                            <p class="info-content">24/7 monitoring and incident response to secure 
                                mission-critical systems.
                                </p>
                        </div>
                    </div>
                    <div class="info-item">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Endpoint Security Solutions</h5>
                            <p class="info-content">Protect agency devices against malware, ransomware, and advanced 
                                persistent threats (APTs).
                                </p>
                        </div>
                    </div>
                    <div class="info-item ">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Zero Trust Security Framework </h5>
                            <p class="info-content">Zero Trust Security Framework – Implement strict access controls and continuous authentication measures.
                                </p>
                        </div>
                    </div>
                </div>
            </div>
        </div>
</div>
</section> -->


<section class="cybersecurity-section response-bg">
    <div class="container custom-container">
        <div class="row cyber-security-inner">
            <div class="col-lg-4 info-inner-lt">
                <div class="info-card ">
                    <h3 class="info-title">Incident Response 
                        & Recovery</h3>
                    <p class="info-content">When time matters most, we bring calm, control, and containment.
                    Our IR team responds with speed, clarity, and precision to restore operations and protect your mission.</p>
                </div>
            </div>
            <div class="col-lg-8 info-inner-rt">
                <div class="info-list">
                    <div class="info-item">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Incident Response Planning </h5>
                            <p class="info-content">We build tailored IR playbooks so your team knows exactly what to do—and when to do it.
                            Roles, communications, escalation paths—it’s all mapped out.
                            Plans don’t just sit on shelves here.
                            They save time, reputations, and missions.</p>
                        </div>
                    </div>
                    <div class="info-item">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Forensic Analysis & Investigation </h5>
                            <p class="info-content">We dig deep to uncover how an incident occurred, what was impacted, and how to prevent recurrence.
                            Chain of custody, root cause, and legal defensibility are baked in.
                            We don’t stop at the breach—we solve the case.
                            Forensics with force.</p>
                        </div>
                    </div>
                    <div class="info-item">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Disaster Recovery & Business Continuity </h5>
                            <p class="info-content">We create strategies that bring systems back online fast—without chaos.
                                From cloud failovers to offline playbooks, we keep operations flowing.
                                Disruption happens. Downtime doesn’t have to.
                                Resilience is built into everything we do.</p>
                        </div>
                    </div>
                    <div class="info-item ">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Cybersecurity Training & Awareness </h5>
                            <p class="info-content">People make mistakes. Training helps prevent them.
                                We educate staff to spot threats, follow procedures, and respond confidently.
                                From phishing to insider threat—we make everyone part of the security team.
                                Awareness is your frontline.
                                </p>
                        </div>
                    </div>
                    <div class="info-item ">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">IR Tabletop Exercises & Drills</h5>
                            <p class="info-content">We lead simulation-based exercises that test your team’s readiness under pressure.
                            Scenarios are realistic, fast-paced, and agency-specific.
                            Train like it’s real—because one day, it might be.
                            Prepared teams recover faster.
                                </p>
                        </div>
                    </div>
                    <div class="info-item ">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">IR Retainer Services </h5>
                            <p class="info-content">Guarantee access to Triad’s IR team with a pre-established agreement.
                                You’ll get priority response and pre-integrated support when you need it most.
                                The clock is ticking—have us on call before it starts.
                                Insurance is good. Experts on speed dial? Better.
                                </p>
                        </div>
                    </div>
                    <div class="info-item ">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Public Affairs & Crisis Comms Support</h5>
                            <p class="info-content">Breaches are public—your response must be too.
                                We help craft messaging for stakeholders, constituents, and media to preserve trust and minimize fallout.
                                Control the narrative, don’t chase it.
                                Security includes reputation.
                                </p>
                        </div>
                    </div>
                </div>
            </div>
           
        </div>
</div>
</section>


<section class="cybersecurity-section col-change compliance-bg">
    <div class="container custom-container">
        <div class="row cyber-security-inner">
            <div class="col-lg-4 info-inner-lt">
                <div class="info-card ">
                    <h3 class="info-title">Compliance & Risk Management</h3>
                    <p class="info-content">Compliance doesn’t have to be confusing—and risk doesn’t have to be reactive.
                    We bring clarity, structure, and leadership to both.</p>
                </div>
            </div>
            <div class="col-lg-8 info-inner-rt">
                <div class="info-list">
                    <div class="info-item">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">NIST 800-171, NIST 800-53, & CMMC Compliance </h5>
                            <p class="info-content">    • We align controls, write documentation, and guide agencies through readiness and certification.
                            Our expertise spans SSPs, POA&Ms, continuous monitoring, and audits
                            Compliance becomes repeatable, sustainable, and stress-free.
                            Frameworks? Mastered. </p>
                        </div>
                    </div>
                    <div class="info-item">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">FedRAMP & FISMA Compliance  </h5>
                            <p class="info-content">We help you build and maintain secure cloud systems that meet federal mandates.
                            Whether it’s self-assessments or audits, we’ve got your back.
                            You focus on the mission—we handle the mountain of paperwork.
                            Secure and certified.</p>
                        </div>
                    </div>
                    <div class="info-item">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Third-Party Risk Assessments </h5>
                            <p class="info-content"> Vendors can create invisible vulnerabilities.
                                We evaluate their controls, contracts, and alignment with your standards.
                                Your risk should never depend on theirs.
                                Due diligence done right.</p>
                        </div>
                    </div>
                    <div class="info-item ">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Continuous Security Monitoring </h5>
                            <p class="info-content">We implement SIEM, logging, and real-time alerting to keep you informed and compliant.
                                Dashboards, KPIs, and alerts ensure full situational awareness.
                                It’s compliance without the constant catch-up.
                                Eyes everywhere.</p>
                        </div>
                    </div>
                    <div class="info-item ">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Insider Threat Program Development</h5>
                            <p class="info-content">We help you build governance and detection capabilities to combat insider threats—both intentional and accidental.
                            From user behavior monitoring to awareness training, we close the gap.
                            The enemy isn’t always outside.
                            Let’s secure the inside, too.</p>
                        </div>
                    </div>
                    <div class="info-item ">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Privacy Impact Assessments (PIAs)</h5>
                            <p class="info-content">We evaluate how personal data is collected, processed, and protected across your systems.
                                Get ahead of legal risk and public scrutiny.
                                Privacy is trust—and trust is everything.
                                Protect the data. Protect the mission.</p>
                        </div>
                    </div>
                </div>
            </div>
            
        </div>
</div>
</section>

<section class="cybersecurity-section cyber-bg">
    <div class="container custom-container">
        <div class="row cyber-security-inner">
            <div class="col-lg-4 info-inner-lt">
                <div class="info-card ">
                    <h3 class="info-title">Cybersecurity-as-a-Service (CaaS)</h3>
                    <p class="info-content">Big capabilities. Small footprint.
                    Our flexible, on-demand services provide enterprise-grade protection—without enterprise-grade overhead.</p>
                </div>
            </div>
            <div class="col-lg-8 info-inner-rt">
                <div class="info-list">
                    <div class="info-item">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Vulnerability Management & Penetration Testing</h5>
                            <p class="info-content">We scan, assess, and attack your systems before the bad guys do.
                            From web apps to SCADA, no weakness goes unchecked.
                            Red team, blue team—we’ve got both.
                            Test. Fix. Repeat.</p>
                        </div>
                    </div>
                    <div class="info-item">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Virtual Chief Information Security Officer (vCISO)</h5>
                            <p class="info-content">Access senior cyber leadership without the salary drain.
                            We provide executive strategy, reporting, board briefings, and roadmap development.
                            It’s guidance with grit.
                            Security. Strategy. Simplified.</p>
                        </div>
                    </div>
                    <div class="info-item">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Ethical Hacking & Red Teaming </h5>
                            <p class="info-content">We simulate real-world adversaries to test your people, processes, and technologies.
                            Our red teams go where the attacker would—then show you how to stop them.
                            No mercy. All value.
                            Better us than them.</p>
                        </div>
                    </div>
                    <div class="info-item ">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Security Awareness & Training  </h5>
                            <p class="info-content">Training built for government teams—engaging, effective, and role-specific.
                            From SOC staff to city hall clerks, we train your whole agency.
                            Knowledge is power.
                            We bring both.</p>
                        </div>
                    </div>
                    <div class="info-item ">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">GRC-as-a-Service (GRCaaS)</h5>
                            <p class="info-content">Let us manage your cybersecurity governance program year-round.
                            We align frameworks, track risks, review controls, and maintain compliance artifacts.
                            One partner. Complete oversight.
                            Governance made easy.</p>
                        </div>
                    </div>
                    <div class="info-item ">
                        <div class="icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="t-logo"></div>
                        <div class="content-inner">
                            <h5 class="info-title">Cyber Insurance Readiness Assessments</h5>
                            <p class="info-content">We assess and improve your posture to qualify for cyber liability coverage.
                                Prepare for applications, reduce premiums, and understand policy gaps.
                                Security and insurability—delivered together.
                                Be covered, not confused.</p>
                        </div>
                    </div>
                </div>
            </div>
            
        </div>
</div>
</section>


<section class="wht-we-offer why-choose">
    <div class="container custom-container">
        <div class="services-section">
            <div class="service-box offer-box">
                <div class="box-inner box-main-title">
                    Why Choose <br><span class="green-color">
                        Triad GovSec?</span>
                </div>
               
            </div>
           
            <div class="service-box">
                <div class="box-inner">
                    <div class="s-icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="s-icon"></div>
              
                    <h4 class="box-title">Government-Focused<br> Expertise</h4>
                    <p class="box-content">We specialize in securing federal, state, and local government systems—understanding the unique challenges and risks agencies face.
                    Our team brings decades of combined experience navigating the complexities of public sector cybersecurity.
                    From procurement processes to legacy systems, we know how to work within government constraints.
                    This isn’t just cybersecurity—it’s cybersecurity built for government.
                        </p>
                </div>
               
            </div>
            <div class="service-box">
                <div class="box-inner">
                    <div class="s-icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="s-icon"></div>
              
                    <h4 class="box-title">Proactive Defense<br> Strategies</h4>
                    <p class="box-content">We don't wait for threats to strike—we anticipate them.
                    Our solutions are designed with forward-looking threat intelligence and real-time response capabilities.
                    Whether it’s nation-state actors or insider threats, we build layered defenses that adapt and evolve.
                    Triad GovSec helps you stay one step ahead, always. </p>
                </div>
               
            </div>
            <div class="service-box">
                <div class="box-inner">
                    <div class="s-icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="s-icon"></div>
              
                    <h4 class="box-title">Regulatory Compliance<br> Leadership</h4>
                    <p class="box-content">Staying compliant isn’t optional—it’s mission critical.
                        We guide agencies through evolving requirements like FISMA, NIST, FedRAMP, and state-specific mandates.
                        Our team ensures documentation, controls, and audit readiness are always in place.
                        With us, compliance is no longer a burden—it’s a strength. 
                    </p>
                </div>
               
            </div>
            <div class="service-box">
                <div class="box-inner">
                    <div class="s-icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="s-icon"></div>
              
                    <h4 class="box-title">End-to-End Security <br>Solutions</h4>
                    <p class="box-content">Cybersecurity is more than a one-time fix—it’s an ongoing strategy.
                        We handle everything from initial risk assessments and policy creation to implementation and continuous monitoring.
                        Whether you need zero trust architecture or incident response planning, we’ve got it covered.
                        Triad GovSec delivers full-spectrum protection with no gaps left behind.</p>
                </div>
               
            </div>
            <div class="service-box">
                <div class="box-inner">
                    <div class="s-icon"><img src="<?php echo get_template_directory_uri(); ?>/img/t-logo1.svg" alt="s-icon"></div>
              
                    <h4 class="box-title">Mission-Driven<br> 
                        Approach</h4>
                    <p class="box-content">We’re not just here to check boxes—we’re here to support your mission.
                    Our security strategies are built to empower your agency’s goals, not slow them down.
                    We understand that public service demands operational continuity, resilience, and trust.
                    Triad GovSec secures what matters most—your ability to serve.
                    </p>
                </div>
               
            </div>
            
            <!-- <div class="row">
                <div class="col-md-3 col-sm-6">
                  
                </div>
                <div class="col-md-3 col-sm-6">
                    <div class="service-box">
                        <i class="fas fa-shield-alt icon"></i>
                        <h4>Comprehensive Cybersecurity Consulting</h4>
                        <p>Strategic guidance to enhance security postures and meet regulatory requirements.</p>
                    </div>
                </div>
                <div class="col-md-3 col-sm-6">
                    <div class="service-box">
                        <i class="fas fa-search icon"></i>
                        <h4>Advanced Threat Detection & Response</h4>
                        <p>Real-time monitoring, analysis, and rapid response to emerging threats.</p>
                    </div>
                </div>
                <div class="col-md-3 col-sm-6">
                    <div class="service-box">
                        <i class="fas fa-file-contract icon"></i>
                        <h4>Compliance & Risk Management</h4>
                        <p>Ensuring adherence to federal cybersecurity frameworks, including NIST and FISMA.</p>
                    </div>
                </div>
            </div>
    
            <div class="row mt-4">
                <div class="col-md-3 col-sm-6">
                    <div class="service-box">
                        <i class="fas fa-network-wired icon"></i>
                        <h4>Security Operations Center (SOC) Services</h4>
                        <p>Continuous monitoring and defense to protect critical infrastructure.</p>
                    </div>
                </div>
                <div class="col-md-3 col-sm-6">
                    <div class="service-box">
                        <i class="fas fa-user-lock icon"></i>
                        <h4>Identity & Access Management (IAM)</h4>
                        <p>Strengthening authentication and access control to secure sensitive systems.</p>
                    </div>
                </div>
                <div class="col-md-3 col-sm-6">
                    <div class="service-box">
                        <i class="fas fa-laptop-code icon"></i>
                        <h4>Security Operations Center (SOC) Services</h4>
                        <p>Continuous monitoring and defense to protect critical infrastructure.</p>
                    </div>
                </div>
                <div class="col-md-3 col-sm-6">
                    <div class="service-box">
                        <i class="fas fa-university icon"></i>
                        <h4>Government-Focused Expertise</h4>
                        <p>Strategic guidance to enhance security postures and meet regulatory requirements.</p>
                    </div>
                </div>
            </div> -->
        </div>
    </div>
</section>
<section class="cyber-defense">
    <div class="container custom-container">
        <diV class="row  defense-inner">
            <div class="image-section">
                <img src="<?php echo get_template_directory_uri(); ?>/img/cyber-defense.png" alt="cyber-defense">
            </div>
            <div class="content-section">
                <div class="main-title">Secure Your Agency Today</div>
                <div class="sub-title">Cybersecurity is no longer optional—it’s a mission-critical requirement. Government agencies operate in an increasingly hostile digital landscape, where nation-state threats, ransomware gangs, and insider risks are growing more sophisticated by the day. At Triad GovSec, we don’t just provide cybersecurity—we deliver resilience, compliance, and confidence. Our team partners with you to understand your mission, assess your unique risk landscape, and implement security solutions that protect what matters most: your data, your operations, and your public trust. Whether you need end-to-end support or targeted expertise, Triad GovSec stands ready to defend your agency with best-in-class strategies and relentless commitment.
            </div>
        </diV>
    </div>
</section>
<section class="lets-build">
    <div class="container custom-container">
        <div class="built-iner">
            <div class="title-sec">
                <!-- Let’s build a resilient, secure <br>
                future together. -->
                Let’s fortify your future <br>
                secure your agency today.
            </div>
            <button class="learn-btn1" onclick="window.location.href='<?php echo site_url('/contact-us'); ?>'">Contact Triad GovSec</button>
        </div>
    </div>
</section>
<?php get_footer(); ?>