Join Our Community

    For You, By You.

    Cybersecurity Solutions Inspired by Your Needs, Built with Your Goals in Mind.

    Piloting the Future of Cybersecurity

    More Than Just Services, a Community-Driven Approach.

    In 2024, our Chief Information Security Officer, Emilyann Fogarty, conducted an extensive listening tour to understand the cybersecurity challenges facing organizations across industries. From higher education and healthcare to research institutions and not-for-profits, we heard your concerns loud and clear.

    We know that cybersecurity isn’t just about technology—it’s about resilience, strategy, and collaboration. That’s why we’ve developed a suite of innovative, community-driven solutions aligned with the NIST Cybersecurity Framework to help organizations of all types strengthen their security posture.

    The Six Pillars of Cybersecurity
    Our cybersecurity solutions are aligned with the NIST Cybersecurity Framework (CSF), a widely adopted model designed to help organizations manage and reduce cybersecurity risk. By mapping our services to each of the six core functions, we ensure members have a strong, practical foundation for building cybersecurity maturity.

    • GOVERN: Ensure your program is aligned with best practices. Our solutions help institutions fulfill the “Govern” function by providing tools, guidance, and expert support to define roles and responsibilities, develop cybersecurity strategies, set measurable goals, and establish communication protocols. We enable organizations to meet governance expectations while aligning cybersecurity efforts with institutional priorities.
    • IDENTIFY: Understand what needs protection. We offer services that support asset discovery, risk assessment, and vulnerability identification—giving organizations visibility into their systems and the threats they face.
    • PROTECT: Defend your infrastructure. From implementing security policies and technical controls to offering staff training and awareness campaigns, our solutions help minimize the risk of successful cyberattacks.
    • DETECT: Recognize threats in real-time. Our monitoring tools, log analysis, and threat detection capabilities empower organizations to spot anomalies and respond quickly—often before damage is done.
    • RESPOND: Take swift action during incidents. We assist members in building effective incident response plans, supporting coordinated communication, and minimizing the impact of cyber events through expert guidance.
    • RECOVER: Resume operations with confidence. Our services support data backup strategies, recovery planning, and post-incident reviews to help institutions restore functionality and improve long-term resilience.
    By delivering solutions tailored to each function of the NIST CSF, we help organizations move from reactive to strategic—ensuring cybersecurity is not just a technology concern, but a mission-aligned priority.
    NIST Cybersecurity Framework 2.0-2
    Member-Driven

    Cybersecurity Solutions.

    Cyber Risk Maturity Blueprint
    Our Cyber Risk Maturity Blueprint is a scalable solution aligned with the Identify pillar of the NIST Cybersecurity Framework. It helps organizations assess their current cybersecurity posture, uncover weaknesses, and identify gaps in alignment with industry best practices. Designed to optimize your existing tools and resources, this blueprint provides a prioritized roadmap to improve maturity, reduce risk, and strategically guide future investments in your security program.
    IDENTIFY NIST CSF
    Cybersecurity Skills Training Program
    Aligned with the Protect pillar of the NIST Cybersecurity Framework, our Cybersecurity Skills Training Program empowers professionals to strengthen defenses through targeted, flexible, and hands-on micro training. Designed to fit your schedule, this program builds essential skills in real time—helping your team protect systems, data, and users while staying productive on the job.
    PROTECT NIST CSF-1
    Penetration Testing
    Aligned with the Detect pillar of the NIST Cybersecurity Framework, our Penetration Testing solution uses expert ethical hackers to uncover exploitable weaknesses in your environment. By simulating real-world attack scenarios, we help you proactively identify vulnerabilities that matter most—so you can take action before adversaries do.
    DETECT NIST CSF-1
    Cyber Resiliency Tabletop Engagements
    Aligned with the Respond pillar of the NIST Cybersecurity Framework, our Cyber Resiliency Tabletop Engagements prepare your entire organization—from the technical team to the board room—to respond effectively to cyber incidents. Through immersive, real-world simulations, participants gain confidence, improve coordination, and strengthen their organization’s ability to contain and manage threats when every second counts.
    RESPOND NIST CSF-1
    Cyber Insurance Review and Advisement
    Guided by the principles of the Recover pillar of the NIST Cybersecurity Framework, our Cyber Insurance Review and Advisement service helps organizations align cybersecurity strategies with business, legal, and contractual obligations. We ensure your policies provide adequate coverage for today’s evolving threat landscape—so you can recover with confidence and minimize disruption in the aftermath of a cyber incident.
    RECOVER NIST CSF-1

    You are Not Alone.

    Our community-driven strategy connects you with peers facing similar institutional challenges, fostering collaboration and
    shared problem-solving.

    Let us help you to connect to peers, solve challenges and advance TOGETHER.
    CyberCommunity

    CyberIntel

    Breaking Down Security Challenges.

    From Eye Rolls to Engagement: How One Organization Got Leadership to Buy Into...

    From Eye Rolls to Engagement: How One Organization Got Leadership to Buy Into...

    Read More
    The Truth Sharpening the Blade: Why Incident Response Tabletop Exercises Are...

    The Truth Sharpening the Blade: Why Incident Response Tabletop Exercises Are...

    Read More
    Getting Started with Cyber Risk Assessments: Lessons from the Front Lines 

    Getting Started with Cyber Risk Assessments: Lessons from the Front Lines

    Read More