| Name | Title | Contact Details |
|---|
For well over a decade, Technical Resource Group has been a proven leader in providing cosulting and permanent placement opportunities for technical and medical professionals.
BlueVoyant combines outstanding talent from the private sector and from the cyber intelligence services of the U.S., Israel, and the U.K. to provide a critical additional layer of defense to companies managing their own cyber threat protection. We have unique capabilities to identify actionable threat intelligence from outside your perimeter, so that your company can protect itself from advanced cyber attacks. In addition, BlueVoyant provides complete Managed Cybersecurity Services to make managing your defenses more efficient. BlueVoyant`s experts have led some of the most high-profile investigations into attacks perpetrated by criminal and nation state adversaries. We have experience with corporate investigations involving ransomware, malware infections, insider threat, data theft, and business email compromise
Loom is a new kind of work communication tool that helps people get their messages across through instantly shareable videos. With Loom, you can capture your screen, record your front-facing camera, and narrate your video all at once—no switching apps or upload required.
RedRock Information Security is a Midwest IT service provider, primarily serving banks and credit unions. At RedRock, technicians and engineers work closely with financial services customers and their vendors to recommend, implement, and maintain regulatory compliant IT solutions. As only one of two FDIC-regulated IT providers in the state of Michigan, we understand your compliance challenges because we face them, too. Our mission is to be the leading, trusted IT resource for businesses in the financial sector, with a genuine commitment to quality and outstanding customer service.
Sevco Security is a company of cyber experts building services and products for cyber experts. Designing solutions to solve hard problem(s) associated with quickly discovering the context for who, what, where, why and how network connected devices relate on your network.