We didn't reinvent the wheel
People and processes is what makes the biggest difference in the maturity of cybersecurity programs, outcomes, and risk. We believe incorporating the zero trust principles of least privilege and integrating disparate systems can be the difference between breached and secured.
By combining the right approach, methodology, values, human intelligence, and technology we can simplify and strengthen Cybersecurity.
We don't exist without you. When know that doing whats right in the long term for your success is what will make us successful.
It is OUR job if it is complex. Beauty comes from obfuscating complexity with simplicity. WE make the complex simple!
It is our job to ask "Why", "How" and challenge the mediocracy of status quo. Curiosity is paired with passion because the drive to seek out and explore is hard, but a prerequisite for innovation.
We let ideas flourish, regardless of where they come from. We value the ability to stay lean and collaborative. Agile, nimble, and without barriers!
Cybersecurity can mean the difference between mission or organizational success and failure. We take our responsibility as trusted advisors, implementers, and operators seriously!
We are micro pessimists but macro optimists. While current state might not be optimal, continuous improvement and disciplined execution overcomes most obstacles.
Some of our Experts' Certifications
Our consultants and engineers have decades of experience and the vendor certifications to prove their knowledge.
The Leadership Team
FOUNDER & MANAGING PRINCIPAL ARCHITECT
CCIE No. 13637 Security, Enterprise Infrastructure, Enterprise Wireless. Prior to founding ModernCyber, Jamie was a principal architect in Cisco’s Global Security Architecture Team. Jamie was a technical leader and member of numerous advisory and working groups. With over 20 years of technical experience in the networking and security industry, Jamie has developed, designed, implemented, and operated enterprise network and security solutions for a wide variety of large clients. Jamie is a dynamic presenter and is a Cisco Live Distinguished Speaker. Jamie had various roles over his career, including: director of cyber security, senior security consultant, and senior network engineer.
Our Team's Work
Integrated Security Technologies and Solutions - Volume I
Integrated Security Technologies and Solutions - Volume II
ISTS Vol II brings together more expert-level instruction in identity, context sharing, encryption, secure connectivity and virtualization. Volume II focuses on the Cisco Identity Services Engine, Context Sharing, TrustSec, Application Programming Interfaces (APIs), Secure Connectivity with VPNs, and the virtualization and automation sections of the CCIE v5 blueprint. Like Volume I, its strong focus on interproduct integration will help you combine formerly disparate systems into seamless, coherent, next-generation security solutions. View details on Amazon.
BRKSEC-2413 - Zero Trust: Protecting Your Modern Workforce with an Intuitive Access Experience
With the ever-increasing pressures on organizations to secure their distributed mobile workforce, Cisco Zero Trust for Workforce provides solutions that establish trust in users and devices through authentication and continuous monitoring of each access attempt, with custom adaptive security policies that protect every application. In this technical session, we will do a deep dive on how Cisco Secure Access by Duo can be used to accelerate workforce zero trust deployment and safeguarding all users, devices, and applications laying the foundation for your zero-trust journey. View details on Cisco Live.
BRKSEC-3432 - Advanced ISE Architect, Design and Scale ISE for your production networks
In today's world of constant attacks, malware and Ransomware, its important to design, deploy and manage your network with an identity aware secure access platform. Cisco ISE is plays an architectural role for many security solutions and is also one of the main pillars in the overall Cisco's Software defined Access Architecture. This session will show you how to deliver scalable and highly available access control services using ISE for wired, wireless, and VPN from a single campus to a global deployment. Methodologies for increasing scalability and redundancy will be covered such as load distribution with and without load balancers, optimal profiling design, lessons learned from the trenches, as well as serviceability tips and tricks to help you gain optimal value and productivity from ISE. View details on Cisco Live.
BRKSEC-3889 - Advanced Security Architecture Integrations using APIs and pxGrid
This session will show how to use Application Programming Interfaces (APIs) and platform exchange Grid (pxGrid) to create native and custom integrations between ISE, NGFW, Firepower MC, StealthWatch, AMP, Umbrella, and others to create an integrated security architecture. Enable programmatic threat avoidance, detection, and remediation required to keep your important applications running in the face of constantly evolving security threats. Demonstrations, Configuration Examples and Code Examples will be used to educate attendees on how to integrate and automate security use cases. View details on Cisco Live.
BRKSEC-2025 - Integrating Security Solutions with Software Defined Access Campus Networks
Integrating and architecting networking and security solutions together, organizations can achieve visibility, trusted access and threat protection. In this session, the integrations between key technologies such as Cisco DNA Center, Identity Services Engine (ISE), Stealthwatch, Encrypted Traffic Analytics (ETA), AMP for Endpoints, and NGFW will be explored and demonstrated. You will learn how security technologies integrate into a SDA Campus Network and the native security features that can simplify deployments. View details on Cisco Live.
BRKSEC-1013 - Connect the dots of NIST 800-207, TIC 3.0, and More Using Cisco SAFE Reference Architecture
Do you not know where to start with Zero Trust (NIST 800-207), TIC 3.0, or other frameworks for security in today's cyber landscape? Using the Cisco SAFE reference architecture to simplify the identification and application of controls can paint a picture and roadmap to effective execution of your mission. This session will highlight the capabilities of common frameworks and how to apply Cisco's SAFE Reference Architecture to these frameworks. View details on Cisco Live.
"ModernCyber was great to work with on our project! They delivered security services for Cisco Security and their experts are some of the best in the world. Would Highly Recommend!"