thecyberdr.com
Open in
urlscan Pro
198.49.23.145
Public Scan
Submitted URL: http://thecyberdr.net/
Effective URL: https://thecyberdr.com/
Submission: On October 10 via api from US — Scanned from DE
Effective URL: https://thecyberdr.com/
Submission: On October 10 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
0 Skip to Content Services Why The Cyber Doctor FAQs Speak With A Human → Open Menu Close Menu Services Why The Cyber Doctor FAQs Speak With A Human → Open Menu Close Menu Services Why The Cyber Doctor FAQs Speak With A Human → YOUR TRUSTED SECURITY GUIDE Get expert advice & a specialized plan Request A Service → Speak With A Human → REAL DOCTORS OF SCIENCE IN CYBERSECURITY DIAGNOSING AND LIMITING CYBERSECURITY INJURIES ONE PRESCRIPTION AT A TIME™ * VIP ONLINE PROTECTION VIP Online Protection provides high-profile executives, individuals, and families with peace of mind to ensure their digital footprint and accounts are secure. * VCISO ADVISORY Does cybersecurity have an independent seat at the table in your organization? Our experts have built and improved security programs while helping organizations avoid, mitigate, transfer, and accept risks. * SECURITY AWARENESS TRAINING Have you invested in securing the weakest link in your organization? Our experts have developed custom security awareness training and implemented commercially off-the-shelf training to improve end-users cyber hygiene. * EXPERT WITNESS/LITIGATION SUPPORT Need expertise for an upcoming or ongoing civil or criminal court proceeding? Our experts have been qualified as expert witnesses in U.S. federal courts on technology, cybersecurity, and digital forensics. * INSIDER THREAT INVESTIGATION Think you have a potential disgruntled current or departed employee or contractor? Our experts have proven success in insider threat intervention, monitoring, and investigations using cutting-edge technology, social engineering, and human intelligence. * MOBILE & DIGITAL FORENSICS Need assistance identifying, preserving, analyzing, documenting, and presenting digital evidence? Our experts have worked with the latest technology and hold industry-leading digital and mobile forensic certifications. * THOUGHT LEADERSHIP Need a quote from an expert or an appearance on an upcoming news segment or conference? Articulating technology and cybersecurity-related information to the masses is an area in which our experts excel. As a result, our experts have been quoted in Compliance Week, Security Magazine, Industry Today, Corporate Compliance Insights, Tech Republic, and Fierce Healthcare. * DIGITAL DIPLOMACY Digital/cyber diplomacy requires a global understanding of diplomatic resources and confidence-building techniques to secure national, bilateral, and multilateral interests. Accordingly, our experts have engaged with state and non-state actors on cybersecurity and technology. Curious to see where your country ranks on the global stage when it comes to cybersecurity? Check out the National Cyber Security Index developed by Estonia’s e-Governance Academy. Request A Service → CAN YOU RELATE? YOU KNOW CYBERSECURITY IS IMPORTANT. BUT IT FEELS OVERWHELMING, INTIMIDATING, AND EXPENSIVE… You want to protect your organization from cybersecurity threats that are always lurking and growing. When you haven’t adequately protected yourself, you feel exposed and hope the odds of not being targeted are in your favor. The problem is that all of us are targets in this modern world. It’s time to finally take cybersecurity seriously. We know it can be intimidating. That’s why we exist. We are specialists that will guide you through the process of not only becoming secure but feeling secure. Our process helps you understand your specific cybersecurity diagnosis. We will develop a specialized and budget-conscience plan. You will be adequately protected with the world’s leading technology and best practices. OUR PROCESS IS EASY 1. ASSESS YOUR NEEDS Even if don’t even know what to ask, we will guide you along the way 2. TAILOR A PLAN We’ll craft an honest plan specific to your needs that considers your budget 3. IMPLEMENT THE PLAN We will lead the project to quickly implement your step-by-step solution READY TO GET STARTED? Speak With A Human → IN EXPERT HANDS WITH DR. STEPHEN BOYCE Dr. Stephen Boyce is the CEO & President at The Cyber Doctor. He is an experienced Cybersecurity professional with a demonstrated history working in federal law enforcement, private sector, public service, & higher education. He serves as a trusted advisor to politicians, lawyers (Am Law 200 & AUSAs), judges, CEOs, Boards of Directors, executive committees, CISOs, CIOs, CTOs, CPOs, and GCs. Prior to creating The Cyber Doctor, Stephen served as a vCISO/Principal Consultant at Unit 42 by Palo Alto Networks (The Crypsis Group), where he led and managed a diverse set of cyber investigations, including but not limited to insider threat, bad leaver, departed employee, ransomware, business email compromise (BEC), trade secret & intellectual property theft, cloud data exposure, divorce disputes, cyber extortion & harassment, securities fraud, & entertainment disputes. In his vCISO capacity, Dr. Boyce served as vCISO for a $2B multinational conglomerate where he created a security program from the ground up by identifying the roles and responsibilities of the new organization, evaluating a managed security service provider (MSSP) to augment the internal security operations center (SOC), and aligning their policies to ISO 27001 and CIS standards. Dr. Boyce spent his federal government career supporting criminal & national security investigations at the Federal Bureau of Investigation and working on cyber diplomacy at the U.S. Department of State. During his federal government career, Dr. Boyce represented the U.S. internationally as a diplomat working on various working groups, committees, and projects. Dr. Boyce holds a Doctorate of Science (DSc.) - Cybersecurity, Masters of Science - Cybersecurity, and Bachelors of Science - Information Technology from Marymount University. GLOBAL REACH. WORLD-CLASS WORK. Our clients are governments, agencies, private institutions, and businesses in countries around the world Speak With A Human → Headquartered in the United States Certifications & Associations WE ARE A FEATURED THOUGHT-LEADER ON CYBERSECURITY MATTERS Featured Orlando Sentinel Noor Salman trial: Pulse gunman Omar Mateen's mother testifies in widow's trial — 'I wish I knew' Orlando Sentinel Orlando Sentinel NBC News FIFA Reeling After 14 Defendants Face Corruption Charges NBC News NBC News Security Magazine U.S. Health and Human Services Department Suffers Cyberattack Security Magazine Security Magazine Crypsis Group Novel O365 Application Breach: Would You Click on My Little Quarantine? Crypsis Group Crypsis Group Zero Day Anatomy of a $2 Million Darkside Ransomware Breach Zero Day Zero Day Corporate Compliance Insights Why Training is Critical in the Fight Against Ransomware Corporate Compliance Insights Corporate Compliance Insights FAQS WHAT CAN MY ORGANIZATION DO TO PREVENT A RANSOMWARE ATTACK? Ransomware attacks are a by-product of poor organizational cybersecurity and information technology practices. Our process is three-tiered and includes humans, processes, and technology: 1. Our security awareness training employs organizations to improve their employee's and contractor's cyber hygiene to spot signs of social engineering and include phishing simulations and tabletop exercises. 2. Through our vCISO advisory services, we have created organizational processes and policies around incident response planning, asset management, software restriction policies, identification of crown jewels, and created in-house and outsourced security operations centers. 3. Our experts are well versed in assessing and implementing the necessary technology to limit the impact of ransomware. Technical controls like multifactor authentication, endpoint detection, response (EDR), vulnerability management, network segmentation, and use of cyber threat intelligence are some of the many technologies we recommend. WHERE CAN I REPORT A SUSPECTED CYBERCRIME? Reporting cybercrime depends on the country where the suspected crime was committed and the laws. Australia Canada Europe/United Kingdom Singapore United Arab Emirates United States CAN DIGITAL & MOBILE FORENSIC SERVICES BE PERFORMED REMOTELY? Cloud-based digital forensics can be performed remotely; however, traditional digital forensics of smartphones, computers, vehicles, and drones will require physical access. WHAT DIGITAL FORENSIC METHODOLOGY DOES THE CYBER DOCTOR USE? We follow a combination of the National Institute of Standards and Technology, the Scientific Working Group on Digital Evidence, and ISO/IEC 27037. ARE RETAINERS REQUIRED? Retainers are required for expert witness/litigation support, mobile & digital forensics services. IS THE CYBER DOCTOR TOOL/VENDOR AGNOSTIC? At The Cyber Doctor, LLC, we have worked with the most leading and cutting-edge cybersecurity and digital forensics products and vendors; however, we will not recommend a specific product or vendor solely based on a market research report. READY TO START A CONVERSATION? Speak With A Human → Copyright © The Cyber Doctor. All rights reserved. Site by Tinker