Project Studies

Secure the Perimeter

Secure the Perimeter

23 Workstreams over 2 years deployed many technologies and policy changes in support of a “Defense In Depth” InfoSec strategy

read more
Studies we haven’t yet written include:

  • Work with the C-suite and for the Board of Directors (BoD)
  • Closing the gap on higher levels of InfoSec Maturity
  • Comprehensive software patching
  • Multi-factor Authentication (MFA) / Two Factor Authentication (2FA)