For You, By You.
Cybersecurity Solutions Inspired by Your Needs, Built with Your Goals in Mind.
Piloting the Future of Cybersecurity
More Than Just Services, a Community-Driven Approach.
In 2024, our Chief Information Security Officer, Emilyann Fogarty, conducted an extensive listening tour to understand the cybersecurity challenges facing organizations across industries. From higher education and healthcare to research institutions and not-for-profits, we heard your concerns loud and clear.
We know that cybersecurity isn’t just about technology—it’s about resilience, strategy, and collaboration. That’s why we’ve developed a suite of innovative, community-driven solutions aligned with the NIST Cybersecurity Framework to help organizations of all types strengthen their security posture.
The Six Pillars of Cybersecurity
Our cybersecurity solutions are aligned with the NIST Cybersecurity Framework (CSF), a widely adopted model designed to help organizations manage and reduce cybersecurity risk. By mapping our services to each of the six core functions, we ensure members have a strong, practical foundation for building cybersecurity maturity.
- GOVERN: Ensure your program is aligned with best practices. Our solutions help institutions fulfill the “Govern” function by providing tools, guidance, and expert support to define roles and responsibilities, develop cybersecurity strategies, set measurable goals, and establish communication protocols. We enable organizations to meet governance expectations while aligning cybersecurity efforts with institutional priorities.
- IDENTIFY: Understand what needs protection. We offer services that support asset discovery, risk assessment, and vulnerability identification—giving organizations visibility into their systems and the threats they face.
- PROTECT: Defend your infrastructure. From implementing security policies and technical controls to offering staff training and awareness campaigns, our solutions help minimize the risk of successful cyberattacks.
- DETECT: Recognize threats in real-time. Our monitoring tools, log analysis, and threat detection capabilities empower organizations to spot anomalies and respond quickly—often before damage is done.
- RESPOND: Take swift action during incidents. We assist members in building effective incident response plans, supporting coordinated communication, and minimizing the impact of cyber events through expert guidance.
- RECOVER: Resume operations with confidence. Our services support data backup strategies, recovery planning, and post-incident reviews to help institutions restore functionality and improve long-term resilience.

Cybersecurity Solutions.
-
Cyber Risk Maturity Blueprint
-
Cybersecurity Skills Training Program
-
Penetration Testing
-
Cyber Resiliency Tabletop Engagements
-
Cyber Insurance Review and Advisement





You are Not Alone.
shared problem-solving.
Let us help you to connect to peers, solve challenges and advance TOGETHER.

CyberIntel
Breaking Down Security Challenges.
From Eye Rolls to Engagement: How One Organization Got Leadership to Buy Into...
From Eye Rolls to Engagement: How One Organization Got Leadership to Buy Into...
The Truth Sharpening the Blade: Why Incident Response Tabletop Exercises Are...
The Truth Sharpening the Blade: Why Incident Response Tabletop Exercises Are...
Getting Started with Cyber Risk Assessments: Lessons from the Front Lines
Getting Started with Cyber Risk Assessments: Lessons from the Front Lines