CORPORATE EXPERTISE
Insider Threat Mitigation
- Minimize human operations in production fabric
- Automate deployment, system configuration, and policy enforcement
- Encrypt content – separate key management from system administrators
Identity Management
- Establish policy based trust for people, workloads
- Providing strong access management and policy enforcement
- Maintain system integrity and enforce non-repudiation
Security Business Process Management
- Integrate security into Developer Operations (DevOps)
- Design for failure: system, human error, and insider threat
- Drive system maturity through automation and policy enforcement
Workload Isolation
- Isolate processes at the workload level
- Prevent crossing of production boundaries
- Implement least privilege, data for people, processes
Policy Based Isolation
- Build authorization schemes around roles, actions, and policies
- Leverage token based authorization for enhanced security
- Establish trust to authorize entire workload
Agile Project Management
- Implementing Agile/SCRUM methodology
- Achieving continuous integration and DevOPS maturity
- Coaching Software Development teams
Technology Focus Areas
Data Science
Massively parallel processing with technology stacks such as hadoop, yarn, ELK to enable a variety of intelligence and defense mission areas to include insider threat, network intrusion detection, anomaly detection, and advanced visualizations.
Mobility
Designing secure mobile solutions for Internet-of-Things (IoT), iOS, Android, and high latency end-points. Leverage secure code delivery, signing, and encryption to isolate and secure mobile workloads. Build and deploy enhanced audit and visualization to discern amorphous attack surfaces.
Cryptography
Cryptographic and token based authorization and federated key management systems. Encrypted search and discovery through tokenization, n-gram, simile, and stemming. Secure code development and deployment. Trust chaining, pass-through, and user-controlled data.
Virtualization
Cloud computing platform development and research. Hypervisor management, to include security and role separation, risk management, and protected virtual machines.