CyberSecurity

Can you spot the next cyber threat?

Can you spot the next insider threat?

Hard isn't it?
Learn more

Can you spot the next cyber threat?

Given the many domains of knowledge involved in cyber, where should a security leader start?
This is where Core Technology Advisors comes into play.

With decades of experience architecting and managing IT, business and cyber for mid-sized to Fortune companies, we are equipped with the knowledge and experience to help you:

  • Understand your current cyber posture from a technical, legal and business point of view
  • Map out next steps based on your priorities
  • Pull in relevant, trusted partners to strengthen your cyber posture

Schedule your time slot with Core's Security Principal Tom Duong today for a confidential cyber consultation.

Required field
Thank you!

Your submission has been received and Tom will contact you shortly to schedule your consultation.
Oops! Something went wrong while submitting the form.
Tom Duong

Tom Duong, CISM

Tom is a security principal at Core Technology Advisors, where he draws on two decades of experience to help clients strengthen their cyber posture. As a first-generation Vietnamese American, he grew up under a corrupt Communist state, where human rights abuses and disinformation were used to manipulate and suppress the populace. Having lived through this brutal past, Tom finds his passion for helping companies and organizations strengthen their cyber posture so that the ideals of democracy can flourish.

Before joining Core Technology Advisors, Tom led multiple global cyber teams at PwC focused on cyber governance, vulnerability engineering, network security, and endpoint security. While at PwC, he championed the creation of a robust cybersecurity infrastructure and architecture, as well as provided guidance on the development of cyber policies and procedures. Before PwC, Tom was a master consultant at Forsythe Solutions Group, where he advised Fortune companies on the implementation and management of large scale, enterprise information systems.  He received Forsythe’s Outstanding Performer Awards for 2004, 2005, 2007, 2011, 2012, and 2013.

Tom holds an Honors Bachelor of Science in Electrical Engineering from Penn State University and is fluent in English and Vietnamese.

CYBER ATTACKS ARE THE SINGLE BIGGEST RISK TO AN ORGANIZATION.

AVERAGE COST OF A DATA BREACH IN THE US IS $7.91 MILLION.

Cyber Services

CISO Consultative
Services

Provides CISOs with the insight to handle cyber management challenges.

Security Program
Assessment

High-level assessment of an organization’s cybersecurity program.

Security Risk
Assessment

Comprehensive assessment of an organization’s cybersecurity posture (attack surfaces, cyber defenses).

Qualys Vulnerability
Assessment

This service uses Qualys to detect and find vulnerabilities in an organization’s IT footprint.

OVER 50% OF COMPANIES BREACHED SAY THEY STRUGGLE TO ATTRACT NEW CUSTOMERS.

CYBERCRIME PROJECTED TO REACH $6 TRILLION BY 2021, MORE PROFITABLE THAN THE WORLDWIDE DRUG TRADE.

Qualys Vulnerability Assessment Service Description

Mobile devices, remediation support.

Out of scope:

Customer determined

Scan scope:

Quarterly

This service uses Qualys VM product to scan and find internal and external vulnerabilities in an organization’s IT assets that an attacker may exploit.

Deliverable:

Frequency: 

Service Overview

1. Kickoff meeting

- Service overview:  review scope, requirements, milestones, timeline, and next steps.

- Organizational and technical interviews.

- Gain stakeholders commitment.

2. Staff meetings to review scope, requirements, milestones, timeline, next steps.

3. Scanner setup.

4. Scan executions.

5. Scan result analysis & tuning.

6. Report generation.

7. Report review.

- Found external, severity 4,5 vulnerabilities

- Found internal, severity 4,5 vulnerabilities

8. Next steps.

9. Schedule follow-up assessment.

SMALL TO MEDIUM BUSINESSES ARE ESPECIALLY VULNERABLE TO A CYBER ATTACK DUE TO LACK TO RESOURCES. IS YOUR BUSINESS PROTECTED?

SCHEDULE A pro bono cybersecurity assessment TODAY