Home2023-03-31T12:21:02-04:00

Information security is more important now than ever before.

Worried about your cybersecurity risks? We can help.

Enterprise Risk Management & Policy Governance Advisory

We provide a wide range of information security services so your team can focus on your core competencies.

Information security risk management (ISRM) is the process of identifying, evaluating, and treating risks associated with the use of information technology. We address uncertainties around your organization’s assets to ensure the desired business outcomes are achieved.

Third-party risk assessment is an analysis of the cyber risk associated with your organization’s third-party suppliers, service providers, and vendors. There are various types of threats within the third-party risk category, which include financial, reputational, environmental, and security risks.

Privacy risk assessments — also known as data protection impact assessments (DPIA) or privacy impact assessments (PIA), exist to ensure you accurately measure and manage the risk to your customers and keep your organization compliant with global data protection regulations. The data privacy risk assessment is your organization’s most powerful tool in combating data theft and protecting your customers and data assets.

Compliance risk assessment helps to identify and assess risks related to applicable regulatory requirements. Internal and external events or conditions affecting the entity’s ability to achieve objectives must be identified, distinguishing between risks and opportunities. Compliance risk assessments specifically identify, prioritize, and control risks associated with the threat of non-compliance in your industry.

Security awareness training is a formal process for educating employees and third-party stakeholders, like contractors and business partners, on how to protect an organization’s computer systems, along with its data, people and other assets, from internet-based threats or criminals.

Security awareness training is a strategy used by IT and security professionals to prevent and mitigate user risk. These programs are designed to help users and employees understand the role they play in helping to combat information security breaches.

A network security assessment is, basically, an audit. It’s a review of your network’s security measures which is meant to find vulnerabilities in your system. A network security assessment is an audit designed to find security vulnerabilities that are at risk of being exploited, could cause harm to business operations, or could expose sensitive information.  

The purpose of a network security assessment is to keep your network, devices, and sensitive data secured from unauthorized access by discovering potential attack vectors from inside and outside of your internal network.

Additionally, you may have a regulatory responsibility to do them, depending on your industry. For example, credit card processors need to comply with PCI DSS and healthcare organizations need to comply with HIPAA. 

Cybersecurity risk management assessment is designed to keep your architectures and systems secure and compliant through a rigorous process of identifying, analyzing, evaluating, and addressing your organization’s ability to handle cybersecurity threats and recover from them.

Enterprise risk management and policy governance advisory

We provide a wide range of information security services so your team can focus on your core competencies.

Information security risk management (ISRM) is the process of identifying, evaluating, and treating risks associated with the use of information technology. We address uncertainties around your organization’s assets to ensure the desired business outcomes are achieved.

Third-party risk assessment is an analysis of the cyber risk associated with your organization’s third-party suppliers, service providers, and vendors. There are various types of threats within the third-party risk category, which include financial, reputational, environmental, and security risks.

Privacy risk assessments — also known as data protection impact assessments (DPIA) or privacy impact assessments (PIA), exist to ensure you accurately measure and manage the risk to your customers and keep your organization compliant with global data protection regulations. The data privacy risk assessment is your organization’s most powerful tool in combating data theft and protecting your customers and data assets.

Compliance risk assessment helps to identify and assess risks related to applicable regulatory requirements. Internal and external events or conditions affecting the entity’s ability to achieve objectives must be identified, distinguishing between risks and opportunities. Compliance risk assessments specifically identify, prioritize, and control risks associated with the threat of non-compliance in your industry.

Security awareness training is a formal process for educating employees and third-party stakeholders, like contractors and business partners, on how to protect an organization’s computer systems, along with its data, people and other assets, from internet-based threats or criminals.

Security awareness training is a strategy used by IT and security professionals to prevent and mitigate user risk. These programs are designed to help users and employees understand the role they play in helping to combat information security breaches.

A network security assessment is, basically, an audit. It’s a review of your network’s security measures which is meant to find vulnerabilities in your system. A network security assessment is an audit designed to find security vulnerabilities that are at risk of being exploited, could cause harm to business operations, or could expose sensitive information.  

The purpose of a network security assessment is to keep your network, devices, and sensitive data secured from unauthorized access by discovering potential attack vectors from inside and outside of your internal network.

Additionally, you may have a regulatory responsibility to do them, depending on your industry. For example, credit card processors need to comply with PCI DSS and healthcare organizations need to comply with HIPAA. 

Cybersecurity risk management assessment is designed to keep your architectures and systems secure and compliant through a rigorous process of identifying, analyzing, evaluating, and addressing your organization’s ability to handle cybersecurity threats and recover from them.

XDR (Extended Detection and Response)-based cybersecurity SOC (Security Operations Center) is a modern approach to cybersecurity that integrates multiple security technologies into a single platform to provide comprehensive threat detection, response, and remediation capabilities. The XDR platform collects data from multiple sources, including network traffic, endpoints, and cloud applications, and uses advanced analytics to identify threats across the entire environment.

Automated Pen Testing (also known as Vulnerability Scanning) is a network penetration test using automated tools and automated processes to detect vulnerabilities. Rather than going through lines of code to check for errors manually, a scanner can be deployed to analyze the codes in a short period of time. 

A vulnerability assessment provides you with a systematic review of the security weaknesses in your information system. It evaluates if the system is susceptible to any known vulnerabilities or threats, assigns severity levels to those vulnerabilities, and recommends remediation or mitigation.

Physical security is the protection of personnel, hardware, software, networks, and data from physical actions and events that could cause serious loss or damage to your organization. Physical security installations offer protection by limiting access to spaces where data is stored. Physical security components connected to the Internet, such as RFID key card door locks, smartphones, and video surveillance cameras, are common targets for hackers.

One of the greatest dangers to endpoint security remains weak protocols, processes, and practices. Busy employees using multiple devices at once do not always exercise the highest degrees of caution before clicking on potentially suspicious links.

Endpoint security refers to the strategies and technologies for preventing, containing, mitigating, and remediating threats to endpoints. Endpoint threats can involve external attacks as well as insider threats, which may be either malicious or unintentional in nature.

Cybersecurity risk mitigation is designed to reduce the probability and/or impact of cyber incidents. Using this method, we will assess your organization’s important assets and ensure them using risk strategy. Your association needs to decide its tolerance to risk, so you can make a mitigation plan that will limit those dangers. Risk tolerance can be either high, medium, or low.

Our cloud security assessment is an evaluation that tests and analyzes your organization’s cloud infrastructure to ensure you are protected from a variety of security risks and threats. The end result will provide you with actionable insights into security misconfigurations and deviations from recommended cloud security architecture to help you prevent, detect, and recover from breaches.

XDR (Extended Detection and Response)-based cybersecurity SOC (Security Operations Center) is a modern approach to cybersecurity that integrates multiple security technologies into a single platform to provide comprehensive threat detection, response, and remediation capabilities. The XDR platform collects data from multiple sources, including network traffic, endpoints, and cloud applications, and uses advanced analytics to identify threats across the entire environment.

Automated Pen Testing (also known as Vulnerability Scanning) is a network penetration test using automated tools and automated processes to detect vulnerabilities. Rather than going through lines of code to check for errors manually, a scanner can be deployed to analyze the codes in a short period of time. 

A vulnerability assessment provides you with a systematic review of the security weaknesses in your information system. It evaluates if the system is susceptible to any known vulnerabilities or threats, assigns severity levels to those vulnerabilities, and recommends remediation or mitigation.

Physical security is the protection of personnel, hardware, software, networks, and data from physical actions and events that could cause serious loss or damage to your organization. Physical security installations offer protection by limiting access to spaces where data is stored. Physical security components connected to the Internet, such as RFID key card door locks, smartphones, and video surveillance cameras, are common targets for hackers.

One of the greatest dangers to endpoint security remains weak protocols, processes, and practices. Busy employees using multiple devices at once do not always exercise the highest degrees of caution before clicking on potentially suspicious links.

Endpoint security refers to the strategies and technologies for preventing, containing, mitigating, and remediating threats to endpoints. Endpoint threats can involve external attacks as well as insider threats, which may be either malicious or unintentional in nature.

Cybersecurity risk mitigation is designed to reduce the probability and/or impact of cyber incidents. Using this method, we will assess your organization’s important assets and ensure them using risk strategy. Your association needs to decide its tolerance to risk, so you can make a mitigation plan that will limit those dangers. Risk tolerance can be either high, medium, or low.

Our cloud security assessment is an evaluation that tests and analyzes your organization’s cloud infrastructure to ensure you are protected from a variety of security risks and threats. The end result will provide you with actionable insights into security misconfigurations and deviations from recommended cloud security architecture to help you prevent, detect, and recover from breaches.

George E. Jones, Jr. cybersecurity expert
George E. Jones, Jr.

The Intrinsic Security Practitioner

Protecting your business is our business.

We’ll provide you with experienced cybersecurity services.

Learn how our strategic partnerships benefit you

Learn how our strategic partnerships benefit you

Your cybersecurity is our passion.

Formed in Michigan in 2011, Intrinsic Security Practitioners (INSP) is a 100% Black American-owned company headed up by cybersecurity expert George E. Jones, Jr. who has over 30 years of experience working at the highest levels of corporate cybersecurity. INSP is proud to be an organization that has been verified by several government agencies while earning multiple certifications in various security specialties.

Credential ID 0808544

Credential ID 1105419

Credential ID 36758

ISACA ID 454068

Your cybersecurity is our passion.

Formed in Michigan in 2011, Intrinsic Security Practitioners (INSP) is a 100% Black American-owned company headed up by cybersecurity expert George E. Jones, Jr. who has over 30 years of experience working at the highest levels of corporate cybersecurity.

INSP is proud to be an organization that has been verified by several government agencies while earning multiple certifications in various security specialties.

Credential ID 0808544

Credential ID 1105419

Credential ID 36758

ISACA ID 454068

Your cybersecurity is our passion.

Formed in Michigan in 2011, Intrinsic Security Practitioners (INSP) is a 100% Black American-owned company headed up by cybersecurity expert George E. Jones, Jr. who has over 30 years of experience working at the highest levels of corporate cybersecurity.

INSP is proud to be an organization that has been verified by several government agencies while earning multiple certifications in various security specialties.

Credential ID 0808544

Credential ID 1105419

Credential ID 36758

ISACA ID 454068

Professional associations

Veteran Business Enterprise (VBE)

Service Disabled Veteran Owned Small Business (SDVOSB)

Small Diverse Business (SDB)

Professional associations

Veteran Business Enterprise (VBE)

Small Diverse Business (SDB)

Service Disabled Veteran Owned Small Business (SDVOSB)

Professional associations

Veteran Business Enterprise (VBE)

Service Disabled Veteran Owned Small Business (SDVOSB)

Small Diverse Business (SDB)

Expert strategies to reach your cybersecurity goals.

“George is a strong Security Solution Architect. I worked with him on several projects and he always delivered everything that I needed, from product evaluations to implementations. In addition to providing strong security solutions, he also managed project tasks and deliverables. I recommend George as an excellent security architect to any organization of any size.”

“George is a strong Security Solution Architect. I worked with him on several projects and he always delivered everything that I needed, from product evaluations to implementations. In addition to providing strong security solutions, he also managed project tasks and deliverables. I recommend George as an excellent security architect to any organization of any size.”

“George Jones is the professional one who seeks to augment the staff; however, regrettably, there aren’t enough George-types to go around. From an IT perspective, he has the ability and natural style to balance the wants/needs of the user with the objectives of the firm so that if at all possible everyone wins. From an audit & compliance perspective, he is a knowledgeable, professional who focuses on facts without emotion. George is both driven and methodical, with a passion for his work and a seemingly unlimited capacity for always doing more. It was truly a pleasure to work with George at HSBC.”

Judy C. Quinton MBA, CISSP, CISA, CRISC, PMP, Information Security Officer (ISO) at a Chicagoland BankJudy C. Quinton MBA, CISSP, CISA, CRISC, PMP, Information Security Officer (ISO) at a Chicagoland Bank

“George is a top-notch information security professional with a diversified background. His expertise in risk management is second to none. He drives to execute flawlessly and has a vast understanding of the information security industry. George is personable and effectively communicates with all levels of management. During our tenure together, George was responsible for the strategic planning and execution of several high-profile global information security projects. His sense of pride and professionalism will be a great asset to any company he works for.”

Ron Clement, CISM, CISSP, GICSP, CCNA, CDPSERon Clement, CISM, CISSP, GICSP, CCNA, CDPSE, IT/ICS Consultant & Owner of CyberQuest Advisory Services, LLC

“George is a fantastic resource with an enormous amount of hands-on working experience in so many different aspects of Information Security. George did a POC, as well as other work for us, and did a spectacular job. I’ve known George for a while now and I’ve always experienced him as a consummate professional who is absolutely dedicated to his craft. I’ll definitely reach out to George in the future for work that he may be able to assist in. He’s a quality professional.”

“George Jones is the professional one who seeks to augment the staff; however, regrettably, there aren’t enough George-types to go around. From an IT perspective, he has the ability and natural style to balance the wants/needs of the user with the objectives of the firm so that if at all possible everyone wins. From an audit & compliance perspective, he is a knowledgeable, professional who focuses on facts without emotion.

George is both driven and methodical, with a passion for his work and a seemingly unlimited capacity for always doing more. It was truly a pleasure to work with George at HSBC.”

Judy C. Quinton MBA, CISSP, CISA, CRISC, PMP, Information Security Officer (ISO) at a Chicagoland BankJudy C. Quinton MBA, CISSP, CISA, CRISC, PMP, Information Security Officer (ISO) at a Chicagoland Bank

“George is a top-notch information security professional with a diversified background. His expertise in risk management is second to none. He drives to execute flawlessly and has a vast understanding of the information security industry. George is personable and effectively communicates with all levels of management.

During our tenure together, George was responsible for the strategic planning and execution of several high-profile global information security projects. His sense of pride and professionalism will be a great asset to any company he works for.”

Ron Clement, CISM, CISSP, GICSP, CCNA, CDPSERon Clement, CISM, CISSP, GICSP, CCNA, CDPSE, IT/ICS Consultant & Owner of CyberQuest Advisory Services, LLC

“George is a fantastic resource with an enormous amount of hands-on working experience in so many different aspects of Information Security. George did a POC, as well as other work for us, and did a spectacular job.

I’ve known George for a while now and I’ve always experienced him as a consummate professional who is absolutely dedicated to his craft. I’ll definitely reach out to George in the future for work that he may be able to assist in. He’s a quality professional.”

Expert strategies to reach your cybersecurity goals.

“George is a strong Security Solution Architect. I worked with him on several projects and he always delivered everything that I needed, from product evaluations to implementations. In addition to providing strong security solutions, he also managed project tasks and deliverables. I recommend George as an excellent security architect to any organization of any size.”

“George is a strong Security Solution Architect. I worked with him on several projects and he always delivered everything that I needed, from product evaluations to implementations. In addition to providing strong security solutions, he also managed project tasks and deliverables. I recommend George as an excellent security architect to any organization of any size.”

“George Jones is the professional one who seeks to augment the staff; however, regrettably, there aren’t enough George-types to go around. From an IT perspective, he has the ability and natural style to balance the wants/needs of the user with the objectives of the firm so that if at all possible everyone wins. From an audit & compliance perspective, he is a knowledgeable, professional who focuses on facts without emotion. George is both driven and methodical, with a passion for his work and a seemingly unlimited capacity for always doing more. It was truly a pleasure to work with George at HSBC.”

Judy C. Quinton MBA, CISSP, CISA, CRISC, PMP, Information Security Officer (ISO) at a Chicagoland BankJudy C. Quinton MBA, CISSP, CISA, CRISC, PMP, Information Security Officer (ISO) at a Chicagoland Bank

“George is a top-notch information security professional with a diversified background. His expertise in risk management is second to none. He drives to execute flawlessly and has a vast understanding of the information security industry. George is personable and effectively communicates with all levels of management. During our tenure together, George was responsible for the strategic planning and execution of several high-profile global information security projects. His sense of pride and professionalism will be a great asset to any company he works for.”

Ron Clement, CISM, CISSP, GICSP, CCNA, CDPSERon Clement, CISM, CISSP, GICSP, CCNA, CDPSE, IT/ICS Consultant & Owner of CyberQuest Advisory Services, LLC

“George is a fantastic resource with an enormous amount of hands-on working experience in so many different aspects of Information Security. George did a POC, as well as other work for us, and did a spectacular job. I’ve known George for a while now and I’ve always experienced him as a consummate professional who is absolutely dedicated to his craft. I’ll definitely reach out to George in the future for work that he may be able to assist in. He’s a quality professional.”

“George Jones is the professional one who seeks to augment the staff; however, regrettably, there aren’t enough George-types to go around. From an IT perspective, he has the ability and natural style to balance the wants/needs of the user with the objectives of the firm so that if at all possible everyone wins. From an audit & compliance perspective, he is a knowledgeable, professional who focuses on facts without emotion.

George is both driven and methodical, with a passion for his work and a seemingly unlimited capacity for always doing more. It was truly a pleasure to work with George at HSBC.”

Judy C. Quinton MBA, CISSP, CISA, CRISC, PMP, Information Security Officer (ISO) at a Chicagoland BankJudy C. Quinton MBA, CISSP, CISA, CRISC, PMP, Information Security Officer (ISO) at a Chicagoland Bank

“George is a top-notch information security professional with a diversified background. His expertise in risk management is second to none. He drives to execute flawlessly and has a vast understanding of the information security industry. George is personable and effectively communicates with all levels of management.

During our tenure together, George was responsible for the strategic planning and execution of several high-profile global information security projects. His sense of pride and professionalism will be a great asset to any company he works for.”

Ron Clement, CISM, CISSP, GICSP, CCNA, CDPSERon Clement, CISM, CISSP, GICSP, CCNA, CDPSE, IT/ICS Consultant & Owner of CyberQuest Advisory Services, LLC

“George is a fantastic resource with an enormous amount of hands-on working experience in so many different aspects of Information Security. George did a POC, as well as other work for us, and did a spectacular job.

I’ve known George for a while now and I’ve always experienced him as a consummate professional who is absolutely dedicated to his craft. I’ll definitely reach out to George in the future for work that he may be able to assist in. He’s a quality professional.”

Expert strategies to reach your cybersecurity goals.

“George is a strong Security Solution Architect. I worked with him on several projects and he always delivered everything that I needed, from product evaluations to implementations. In addition to providing strong security solutions, he also managed project tasks and deliverables. I recommend George as an excellent security architect to any organization of any size.”

“George Jones is the professional one who seeks to augment the staff; however, regrettably, there aren’t enough George-types to go around. From an IT perspective, he has the ability and natural style to balance the wants/needs of the user with the objectives of the firm so that if at all possible everyone wins.

From an audit & compliance perspective, he is a knowledgeable, professional who focuses on facts without emotion. George is both driven and methodical, with a passion for his work and a seemingly unlimited capacity for always doing more. It was truly a pleasure to work with George at HSBC.”

Judy C. Quinton MBA, CISSP, CISA, CRISC, PMP, Information Security Officer (ISO) at a Chicagoland BankJudy C. Quinton MBA, CISSP, CISA, CRISC, PMP, Information Security Officer (ISO) at a Chicagoland Bank

“George is a top-notch information security professional with a diversified background. His expertise in risk management is second to none. He drives to execute flawlessly and has a vast understanding of the information security industry.

George is personable and effectively communicates with all levels of management. During our tenure together, George was responsible for the strategic planning and execution of several high-profile global information security projects. His sense of pride and professionalism will be a great asset to any company he works for.”

Ron Clement, CISM, CISSP, GICSP, CCNA, CDPSERon Clement, CISM, CISSP, GICSP, CCNA, CDPSE, IT/ICS Consultant & Owner of CyberQuest Advisory Services, LLC

“George is a fantastic resource with an enormous amount of hands-on working experience in so many different aspects of Information Security. George did a POC, as well as other work for us, and did a spectacular job.

I’ve known George for a while now and I’ve always experienced him as a consummate professional who is absolutely dedicated to his craft. I’ll definitely reach out to George in the future for work that he may be able to assist in. He’s a quality professional.”

Protect. Detect. Respond. Heal.

From start-up businesses to global enterprises, we offer effective solutions across your entire digital ecosystem.

We’ll help you reduce the risk of a cybersecurity attack while meeting global compliance standards.

We’ll help you reduce the risk of a cybersecurity attack while meeting global compliance standards.

Let’s Talk

By submitting my data I agree to be contacted.

Protect. Detect. Respond. Heal.

From start-up businesses to global enterprises, we offer effective solutions across your entire digital ecosystem.

We’ll help you reduce the risk of a cybersecurity attack while meeting global compliance standards.

Let’s Talk

George E. Jones, Jr. cybersecurity expert
George E. Jones, Jr.

The Intrinsic Security Practitioner

We’ll provide you with experienced cybersecurity services.

By submitting my data I agree to be contacted.