thecyberdr.com Open in urlscan Pro
198.49.23.145  Public Scan

Submitted URL: http://thecyberdr.net/
Effective URL: https://thecyberdr.com/
Submission: On October 10 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

0
Skip to Content


Services
Why The Cyber Doctor
FAQs
Speak With A Human →
Open Menu Close Menu

Services
Why The Cyber Doctor
FAQs
Speak With A Human →
Open Menu Close Menu

Services
Why The Cyber Doctor
FAQs

Speak With A Human →


YOUR TRUSTED SECURITY GUIDE

Get expert advice & a specialized plan

Request A Service →
Speak With A Human →

REAL DOCTORS OF SCIENCE IN CYBERSECURITY


DIAGNOSING AND LIMITING CYBERSECURITY INJURIES ONE PRESCRIPTION AT A TIME™


 * VIP ONLINE PROTECTION
   
   VIP Online Protection provides high-profile executives, individuals, and
   families with peace of mind to ensure their digital footprint and accounts
   are secure.


 * VCISO ADVISORY
   
   Does cybersecurity have an independent seat at the table in your
   organization? Our experts have built and improved security programs while
   helping organizations avoid, mitigate, transfer, and accept risks.


 * SECURITY AWARENESS TRAINING
   
   Have you invested in securing the weakest link in your organization? Our
   experts have developed custom security awareness training and implemented
   commercially off-the-shelf training to improve end-users cyber hygiene.


 * EXPERT WITNESS/LITIGATION SUPPORT
   
   Need expertise for an upcoming or ongoing civil or criminal court proceeding?
   Our experts have been qualified as expert witnesses in U.S. federal courts on
   technology, cybersecurity, and digital forensics.


 * INSIDER THREAT INVESTIGATION
   
   Think you have a potential disgruntled current or departed employee or
   contractor? Our experts have proven success in insider threat intervention,
   monitoring, and investigations using cutting-edge technology, social
   engineering, and human intelligence.


 * MOBILE & DIGITAL FORENSICS
   
   Need assistance identifying, preserving, analyzing, documenting, and
   presenting digital evidence? Our experts have worked with the latest
   technology and hold industry-leading digital and mobile forensic
   certifications.


 * THOUGHT LEADERSHIP
   
   Need a quote from an expert or an appearance on an upcoming news segment or
   conference? Articulating technology and cybersecurity-related information to
   the masses is an area in which our experts excel. As a result, our experts
   have been quoted in Compliance Week, Security Magazine, Industry Today,
   Corporate Compliance Insights, Tech Republic, and Fierce Healthcare.


 * DIGITAL DIPLOMACY
   
   Digital/cyber diplomacy requires a global understanding of diplomatic
   resources and confidence-building techniques to secure national, bilateral,
   and multilateral interests. Accordingly, our experts have engaged with state
   and non-state actors on cybersecurity and technology. Curious to see where
   your country ranks on the global stage when it comes to cybersecurity? Check
   out the National Cyber Security Index developed by Estonia’s e-Governance
   Academy.

Request A Service →


CAN YOU RELATE?


YOU KNOW CYBERSECURITY IS IMPORTANT. BUT IT FEELS OVERWHELMING, INTIMIDATING,
AND EXPENSIVE…

You want to protect your organization from cybersecurity threats that are always
lurking and growing. When you haven’t adequately protected yourself, you feel
exposed and hope the odds of not being targeted are in your favor. The problem
is that all of us are targets in this modern world.

It’s time to finally take cybersecurity seriously. We know it can be
intimidating. That’s why we exist. We are specialists that will guide you
through the process of not only becoming secure but feeling secure. Our process
helps you understand your specific cybersecurity diagnosis.

We will develop a specialized and budget-conscience plan. You will be adequately
protected with the world’s leading technology and best practices.

 


OUR PROCESS IS EASY

 

1. ASSESS YOUR NEEDS

Even if don’t even know what to ask, we will guide you along the way

2. TAILOR A PLAN

We’ll craft an honest plan specific to your needs that considers your budget

3. IMPLEMENT THE PLAN

We will lead the project to quickly implement your step-by-step solution

 


READY TO GET STARTED?

Speak With A Human →


IN EXPERT HANDS WITH DR. STEPHEN BOYCE

Dr. Stephen Boyce is the CEO & President at The Cyber Doctor.  He is an
experienced Cybersecurity professional with a demonstrated history working in
federal law enforcement, private sector, public service, & higher education.  He
serves as a trusted advisor to politicians, lawyers (Am Law 200 & AUSAs),
judges, CEOs, Boards of Directors, executive committees, CISOs, CIOs, CTOs,
CPOs, and GCs.

Prior to creating The Cyber Doctor, Stephen served as a vCISO/Principal
Consultant at Unit 42 by Palo Alto Networks (The Crypsis Group), where he led
and managed a diverse set of cyber investigations, including but not limited to
insider threat, bad leaver, departed employee, ransomware, business email
compromise (BEC), trade secret & intellectual property theft, cloud data
exposure, divorce disputes, cyber extortion & harassment, securities fraud, &
entertainment disputes.  In his vCISO capacity, Dr. Boyce served as vCISO for a
$2B multinational conglomerate where he created a security program from the
ground up by identifying the roles and responsibilities of the new organization,
evaluating a managed security service provider (MSSP) to augment the internal
security operations center (SOC), and aligning their policies to ISO 27001 and
CIS standards.

Dr. Boyce spent his federal government career supporting criminal & national
security investigations at the Federal Bureau of Investigation and working on
cyber diplomacy at the U.S. Department of State.  During his federal government
career, Dr. Boyce represented the U.S. internationally as a diplomat working on
various working groups, committees, and projects.

Dr. Boyce holds a Doctorate of Science (DSc.) - Cybersecurity, Masters of
Science - Cybersecurity, and Bachelors of Science - Information Technology from
Marymount University.




GLOBAL REACH.
WORLD-CLASS WORK.

Our clients are governments, agencies, private institutions, and businesses in
countries around the world

Speak With A Human →

Headquartered in the United States

Certifications & Associations



 WE ARE A FEATURED THOUGHT-LEADER ON CYBERSECURITY MATTERS

 
Featured

Orlando Sentinel

Noor Salman trial: Pulse gunman Omar Mateen's mother testifies in widow's trial
— 'I wish I knew'
Orlando Sentinel

Orlando Sentinel

NBC News

FIFA Reeling After 14 Defendants Face Corruption Charges
NBC News

NBC News

Security Magazine

U.S. Health and Human Services Department Suffers Cyberattack
Security Magazine

Security Magazine

Crypsis Group

Novel O365 Application Breach: Would You Click on My Little Quarantine?
Crypsis Group

Crypsis Group

Zero Day

Anatomy of a $2 Million Darkside Ransomware Breach
Zero Day

Zero Day

Corporate Compliance Insights

Why Training is Critical in the Fight Against Ransomware
Corporate Compliance Insights

Corporate Compliance Insights



FAQS

WHAT CAN MY ORGANIZATION DO TO PREVENT A RANSOMWARE ATTACK?

Ransomware attacks are a by-product of poor organizational cybersecurity and
information technology practices. Our process is three-tiered and includes
humans, processes, and technology:

 1. Our security awareness training employs organizations to improve their
    employee's and contractor's cyber hygiene to spot signs of social
    engineering and include phishing simulations and tabletop exercises.

 2. Through our vCISO advisory services, we have created organizational
    processes and policies around incident response planning, asset management,
    software restriction policies, identification of crown jewels, and created
    in-house and outsourced security operations centers.

 3. Our experts are well versed in assessing and implementing the necessary
    technology to limit the impact of ransomware. Technical controls like
    multifactor authentication, endpoint detection, response (EDR),
    vulnerability management, network segmentation, and use of cyber threat
    intelligence are some of the many technologies we recommend.

WHERE CAN I REPORT A SUSPECTED CYBERCRIME?

Reporting cybercrime depends on the country where the suspected crime was
committed and the laws.

Australia
Canada
Europe/United Kingdom
Singapore
United Arab Emirates
United States

CAN DIGITAL & MOBILE FORENSIC SERVICES BE PERFORMED REMOTELY?

Cloud-based digital forensics can be performed remotely; however, traditional
digital forensics of smartphones, computers, vehicles, and drones will require
physical access.



WHAT DIGITAL FORENSIC METHODOLOGY DOES THE CYBER DOCTOR USE?

We follow a combination of the National Institute of Standards and Technology,
the Scientific Working Group on Digital Evidence, and ISO/IEC 27037.



ARE RETAINERS REQUIRED?

Retainers are required for expert witness/litigation support, mobile & digital
forensics services.



IS THE CYBER DOCTOR TOOL/VENDOR AGNOSTIC?

At The Cyber Doctor, LLC, we have worked with the most leading and cutting-edge
cybersecurity and digital forensics products and vendors; however, we will not
recommend a specific product or vendor solely based on a market research report.


READY TO START A CONVERSATION?

Speak With A Human →

Copyright © The Cyber Doctor. All rights reserved.

 Site by Tinker