Training

  Public & Private Sector Training and Mentoring

We offer and arrange government and corporate business trainings and workshops designed for specific customer needs. The sessions are delivered by subject-matter experts who bring practical insight from real-world arenas. Focus areas: public policy and program development, leveraging economies of scale, supply chain security and cost, and innovation engineering.


Intelligence, Cyber, and Risk Management

Our offerings include C-Suite and senior managment team performance evaluation, financial and technology risk management, and specialized topics suitable to current agency goals, National Defense and commercial sector priorities.


C-Suite and Senior Manager Performance Tips

We mentor senior to executive management and teams on critical topics in today's digital and management ecosystems:  optiizing inventory and supply chain costs; digital and financial risk mitigation; and product development and innovation.


US Military and OTAN Workshps, Custom Training

Call for details or with special requests.

DELOITTE CYBER TRAINING


Training for Deloitte senior managers and other industry cyber teams to teach them how to train employees to be a project or agency's best frontline defense against cyber threat. We cover specialized Cyber, counter-intelligence, and OPSEC situations and risk mitigation. 


We also provide two decades of specialized China expertise to support Deloitte's own China Cyber Risk Advisory; and to support detailed technical and audit policy compliance with international banking, NIST, FedRAMP, and other US Government and global compliance standards.


IBM WATSON & TENABLE, A DUAL DEFENSE


We help clients integrate, customize, and leverage this great duo for the best in consumer analytics and sales improvement; and greatly-enhanced external and internal risk mitigation.


  • We show you how to customize Tenable robust endpoint security and network mapping capabilities to discover, visualize, and locate every device touching those who touch your networks. Indispensable for any critical infrastructure defense.
  • We add Watson's AI pattern recognition and prediction to put you on top of develping cyber, terrorism, and crime trends: match mac ids, hash, and packet traffic against federal alarms, profiles and  prior activity or employee device registrations to optimize insider, OPSEC, and malware protection. Share real-time amongst IT, business, and law enforcement.

Menu

Menu

Share by: