Cyber & Strategic Risk

Cybersecurity & Risk

Military Cyber                 Financial Exchanges & Banking              Data Security                  Enpoint & IOT           Risk, Compliance  & Audit

Reinforce Hardening

Manage Your Endpoints

Seize Opportunities

Disrupt your Disruptors

Question Everything


Cybersecurity is not just about managing risk, it is also a strategic framework shaped by product capabilities, organizational sophistication, and leadership outlook. For cyber to be effective, C-Suite must regard it as important, not an IT afterthought. Until leadership makes the decision to prioritize, nothing will change.
Endpoint Security

Defining, monitoring, and managing full endpoint security across user IOT arenas

Malware Defense & Response

OPSEC and user training to better safeguard from malware hijacks

FedRamp & NIST

Government & vendor cloud protection standards for data and IT security

White Hat for Space Systems

Satelite bus, gyroscope, and other signal disruption, acquisition, and replacement

Space & Satellite Cyber

Satellite, ground station, and infrastructure cyber defense and test design

FISMA Compliance

2023 -24 cyber compliance for government agencies & their vendors

  • The Ukraine as an Example of Failed (GPS) Cyber

    Probably the worst example of cyber security lapse this century is the failure to adequately secure US GPS navigational signal, managed by the highly skilled US Military, against enemy or terrorist use. And as a result the horrifying devastation in the Ukraine has continued for over 2 years - with almost 85% of all Russian attacks (drone, missile, jet and naval) guided by US GPS from Peterson AFB in Colorado. A tragic example of 'group think' and failure to 'question everything' by US & NATO leadership. There is absolutely no technical or logical reason why this was allowed to happen, or why it is still ongoing - except for a lack of technical understanding, and/or will, on the part of the US leadership involved. 


    Whilst satellites are largely dumb machines with one a few signal emmissions possible, there remain many ways to isolate, identify, and block or disrupt enemy or terrorist uplink to and download from the normal three-satellite cluster and ground station constellation required for any navigational guidance. And the majority of GPS guidance and memory chips, and gyroscopic equipment, used by Russia (and China and North Korea and Iran) remain largely US or other Western nation in origin - with each number recorded in manufacturing and shipping inventories for decades. Russia does not even obscure or alter the numbers on the chips and GPS receivers it uses. A hacker's dream. And we ignore this and other golden opportunities to use cyber controls to harden the surface of our US military space and satellite stategic and tactical systems against enemy use. 

  • FedRAMP Compliance Audit

    FedRamp remains the gold standard for US national security and cyber threats in large, distributed computing environments.  When FedRAMP POAMs (readiness milestones, and US military / federal OPSEC (operational security) is achieved, and users - including tech support and third party vendors - are repeatedly trained and tested in both protocols, the network is almost infallible.  Most malware, DOS, hash, and other cyber intrusions occur because of sloppy cyber - IT protocol, and/or user error or inattention.


    We help clients understand and prepare for FedRAMP compliance testing; and provide refresher training and evaluation services for both this cyber protocol and OPSEC.  Once an entity or agency becomes versed in FedRAMP, the problem areas of so much cyber intrusion - failure to synchronize OS or software updates, failure to monitor direct endpoints or access from personal devices, off-network use from on-network devices - disappear. Your surface is hardened, and your workforce and managers are well-trained and the nuances of cyber defense become habit.



  • 2023 White House Cyber Support

    FedRamp remains the gold standard for US national security and cyber threats in large, distributed computing environments.  When FedRAMP POAMs (readiness milestones, and US military / federal OPSEC (operational security) is achieved, and users - including tech support and third party vendors - are repeatedly trained and tested in both protocols, the network is almost infallible.  Most malware, DOS, hash, and other cyber intrusions occur because of sloppy cyber - IT protocol, and/or user error or inattention.


    We help clients understand and prepare for FedRAMP compliance testing; and provide refresher training and evaluation services for both this cyber protocol and OPSEC.  Once an entity or agency becomes versed in FedRAMP, the problem areas of so much cyber intrusion - failure to synchronize OS or software updates, failure to monitor direct endpoints or access from personal devices, off-network use from on-network devices - disappear. Your surface is hardened, and your workforce and managers are well-trained and the nuances of cyber defense become habit.



  • Enterprise Financial Cyber

    Our financial cyber advisory includes the migration of Capital One's $3 trillion in portfolio managment to its new IT HQ in Richmond, VA. And World Bank crisis mitigation advisory following a breach to its Washington DC HQ.  As US military and national intelligence advisors, we specialize in emergency and rapid response protocol. 


    Our clients include: the Egyptian Development Bank (data recovery); disaster recovery and backup for AT&T and Anthem call centers; Ameriprise and Stock Exchange clients (platform security audit). 





  • NATO - US Cyber Synchronization

    As the US military expands into European theatre action with the Ukraine war, and as Russian and PRC Chinese sanctions are ordered for US and NATO nations, the demarcation between US and allied critical infrastructure is blurred. NATO was the first to recognize and formalize cyber response and protection for blended domains of military and civilian critical infrastructure. 


    Our work includes SHAPE, SOCOM, EUCOM, UK, and US vulnerability analysis for White House and other leadership; and space, energy, and financial arena intelligence, cyber support, and training. Including agency, vendor, and Big 4 management training, SOC evaluation, and implementation leadership for adjacent arenas and agencies under NIST and US Homeland Security compliance or contracts. 

Share by: