| Name | Title | Contact Details |
|---|
REACTIVES MANAGEMENT CORPORATION is a Chesapeake, VA-based company in the Computers and Electronics sector.
A global association of 140,000 professionals in 180 countries, ISACA helps business and IT leaders maximize value and manage risk related to information and technology. Founded in 1969, the nonprofit, independent ISACA is an advocate for professionals involved in information security, assurance, risk management and governance. These professionals rely on ISACA as the trusted source for information and technology knowledge, community, standards and certification. The association, which has more than 200 chapters worldwide, advances and validates business-critical skills and knowledge through the globally respected Certified Information Systems Auditor® (CISA®), Certified Information Security Manager® (CISM®), Certified in the Governance of Enterprise IT® (CGEIT®) and Certified in Risk and Information Systems Control™ (CRISC™) credentials. ISACA also developed and continually updates COBIT®, a business framework that helps enterprises in all industries and geographies govern and manage their information and technology.
With decades of experience in the IT consulting services and solutions industry, we have decided to share our experience to help others. Cambridge Resources is not just another solutions and staffing agency. At Cambridge, our “ramp up” resourcing and residency process is designed to empower your technical team and outfit them with the people they need to succeed.
Digital Harbor is a Reston, VA-based company in the Computers and Electronics sector.
Expel is a managed detection and response (MDR) provider whose vision is to make great security accessible. The company offers 24x7 security monitoring and response for cloud, hybrid and on-premises environments. Expel uses the security signals customers already have so organizations can get more value from their existing security investments. And Expel connects to customer tech remotely through APIs, not agents, so its security operations center (SOC) can start monitoring a customer`s environment in a matter of hours, letting their internal teams get back to focusing on the most strategic security priorities that are unique to their business.