MALICIOUS INFLUENCE OPERATIONS
01 / INTELLIGENT
Large language models allow threat actors to create and deliver tens of thousands of individualized messages. Realistic voice generation allows convincing impersonations of co-workers and executives.
02 / DESTRUCTIVE
Malicious influence operations cost billions of dollars per year, and in some cases millions of dollars per incident.
03 / PERVASIVE
Attackers don't limit themselves to email phishing attacks; they exploit social media, and create deceptive groups to foster large-scale acceptance of their deceptions.
STANDARDS OF PRACTICE
Monthly session with our analyst to help you implement standards of practice tailored to your organization:
Structure and makeup of IT systems, content, and mechanisms
Regulatory and internal oversight requirements
Current structure of cyber-security management including feedback and decision-making mechanisms
TRAINING BY GAMING
After the first session's information capture, we prepare a unique Training by Gaming application:
Gamified influence operations awareness training
Improve your workforce's skills without punishment, and without interfering with your production systems
AI methods for generation and analysis
Montly live online remote sessions with our CCIOP Lead to:
Track and maintain progress
Advise on ongoing human risk management concerns
Access our technology suite including our SaaS tool used for the CCIOP assessment
Human Risk Management
Training focused on the cognitive element
Technology focused on mitigating consequences
Download our Tearsheet to learn more
Who We Are
Dedication. Expertise. Passion.
Doug Simmons has spent more than 30 years advising organizations around the world on their cyber-security strategies and architectures.
As the Vice President of Gartner's (and Burton Group's) Security and Risk Management consulting group for 15 years, he led hundreds of organizations developing, assessing, and revising their approaches to information protection.
Doug's efforts focus on the emerging field of Human Risk Management, where cognitive attacks are exploited to gain advantages resulting in cyber extortion, high valued information leaks, financial frauds, large-scale denial of services, and other consequences.
VP of Business Development
Dave Bailey has spent more than 30 years in technology product marketing, client education, and sales. Dave’s experience encompasses a wide range of organizations including UNISYS, Wang Labs, DEC, ORACLE, and Gartner Research. Dave also spent over 13 years at Burton Group helping fuel the company’s explosive growth which culminated with their acquisition by Gartner in 2010.
Dave has a strong track record of building and leading high-performance sales teams, developing winning go to market strategies, and consistently exceeding revenue targets in customer environments ranging from Fortune 1000 organizations, Federal government agencies (DoD and Civilian), to educational institutions and small businesses.
Dave completed his Bachelor of Science in Production Management from DePaul University College of Commerce and a Master’s of Business Administration from DePaul University’s Driehaus Graduate School of Business.