AnalyticsQuad

Analytical Systems a Critical Tool

There are many organizations that support Crisis Response, Law Enforcement, Military Operations, and Critical Infrastructure Protection with the latest in technology advances.  There are really fantastic tools available in this realm delivering advanced capabilities, that together, create a system-of-systems which aides in knowledge management and real-time critical decision-making.  These systems include items such as high resolution…

CyberSecurity

5 Steps To Secure Your Small Business

According to Symantec, the last 5 years have shown a steady increase in attacks targeting businesses with less than 250 employees.  The US Cyber Security Alliance reports 60% of Small business that suffer an attack are unable to recover.  Additionally, the Ponemon institute reports indicated the average cost for small business to recover and respond…

CyberSecurity

Design Thinking and Cyber Security, using Operational Design and Design Thinking Concepts to Develop a CyberSecurity Program

While I was in the military, dealing with complex international crises was the order of the day.  We used a planning technique developed by the Israeli Defense Force and championed by the U.S. Special Operations Command, Operational Design.  The concept of Operational Design uses the skills and techniques of design thinking to plan complex operations. These…

S.A. Client Fusion Center Systems Design

JOHNSTEK, Inc. was selected to design a high end system-of-systems for a large Latin American organization that optimize the reporting and visualization of data using advanced technologies. Information is made available for correlation and reporting by employing standardized methodologies of data extracting, semantic tagging and indexing critical information, index of geo-references, and enabling web services…

Thunderstorm Group LLC Vulnerability Study

JOHNSTEK, Inc. supported Thunderstorm Group in a study of Carlos Alibizu University security vulnerabilities. The analysis of Information Technology risk management included an evaluation of the university’s posture in the areas of Computer Security, Information Assurance, and Disaster Planning. The current Information Technology risks were evaluated under the categories detailed in the JOHNSTEK Vulnerability Assessment…