Skip to main content


Securing the City's infrastructure, network, and data by establishing strong policies and practices while integrating superior cybersecurity tools.


Our Core work

We monitor key City information technology architecture in order to detect, assess, and protect against internal and external threats.

Business Continuity Planning and Disaster Recovery Planning

Assists with the preparation and evaluation of Continuity of Operations Plan (COOP) through DPR3 Policy.

Centralized Security Information and Event Management (SIEM)

System logging, event monitoring, search/correlation capable alerting software.

Identity and Access Management (IAM)

​User and service provisioning, centralized authentication.

Vulnerability Management

Network scanning to identify vulnerabilities and make effective remediation recommendations.​

Frequently asked questions

  • Call (415) 581-7100 or contact us via email.
  • Threat assessment is a structured process used to evaluate the risk posed by an agent of malware. DT Security Services takes it upon itself to provide a process that allows for the systematic review of risk, threats, and concerns and provide cost-effective measures to lower risk to an acceptable level. The Security Services team has a number of tools with which we provide strategic understanding and real-time monitoring of the information security threats to your organization and infrastructure.
  • Electronic discovery (eDiscovery) is the process of seeking, securing and searching electronic data with the intent of using it as evidence in a civil or criminal legal case. eDiscovery can be performed on individual computers, applications with repositories or on network logs.
  • The Security Services team provides security education and awareness training to employees of the City and County of San Francisco. We aim to provide employees with current information and access to tools so that they our employees are the first line of defense when protecting the network.
  • Information Security is not just technology. It is a process, policy, and culture. The Security Services team has best practices, tools, and other resources necessary to provide continuity of operations in worst-case scenarios. Contact the Security Services team to discuss what you can do.