Graph Image

Invictus Insights

Cyber Security as a Service: A Pragmatic Approach to “Service-izing” Cyber

G. Michael Carroll discusses the concept of “service-izing” cybersecurity offerings.

read more

Measure Twice Before You Buy: Supply Chain Risk Management (SCRM)

Jonathan Schlosser and Ric Van Antwerp discuss how to apply a “measure twice, cut once” philosophy to Cybersecurity Supply Chain Risk Management.

read more

Cyber Warfare Visualization

Invictus’ Seth Wade dives into the topic of how Invictus is using technology typically found in the gaming industry to bring next-gen simulation capabilities on the cyber warfare front.

read more

Maturing Secure Mobile Computing in the DoD

Mobile computing has matured significantly in the past forty years. The Department of Defense (DoD) has long had platforms to perform mobile computing missions, yet there has been a move away from specialized systems to ruggedized laptops, commercial tablets and cell phones expected to perform the same functions.

read more

Driving Cyber Resilience for Space-Based Missions

Historically, the vulnerability of space-based resources has often been overlooked in wider discussions of cyber threats to our critical infrastructure. However, similar to any digitally networked system, these assets are highly vulnerable to cyber-attacks.

read more

A Cybersecure Cultural Mindset

October is National Cyber Security Awareness Month where the Department of Homeland Security and private sector partners work together to raise awareness about cyber threats in our personal and professional lives. A pervasive cultural mindset that cybersecurity is everyone’s responsibility highlights the true measure of an organization’s cybersecurity program maturation and success potential.

read more

Intelligence Analysis Staff Augmentation Support: Current and Future Needs

All-source intelligence staff augmentation support to the US government is a foundational component of Invictus International Consulting. The programs we first supported three years ago provided intelligence analysis support to national-level counter terrorism agencies and Combatant Commands (CCMDs).

read more

Artificial Intelligence: Transforming Our Work

Artificial Intelligence will have a growing role in our increasingly interconnected world. As Cyber Spartans, Invictus is continuously upgrading our skills and knowledge in order to stay ahead of our adversaries.

read more

Insider Threat and Cyber Espionage: Watch Your Back!

As a discipline, Insider Threat is often misunderstood, in part because of the nature of the term. An “Insider” is typically someone who plays an integral role in an organization and is trusted with sensitive information, resources, infrastructure, and data, while a “Threat” is something that possesses a serious risk…

read more

The Front Door Concept: Creating a Central Point of Entry Into a Cybersecurity Program

Strengthening an organization’s cybersecurity posture does not always have to be an effort strictly focused on zeros and ones or whether you have a governance structure in place that is tailored to the enterprise in the context of its operating environment. Strategic use of people, coupled with improved processes…

read more