Welcome to i2IS

Cyberspace Solutions

Our Solutions

CYBER INGENUITY™ is an end-to-end security design and implementation solution.

It addresses all risks with four areas of focus:

  1. Dynamic Command and Control (CYBER OpSentry™)

  2. Executive and Employee Training (CYBER CITIZENSHIP™)

  3. Governance, Oversight and Enforcement

  4. Tailored Cybersecurity Problem-Solving


Dynamic Command and Control

CYBER OpSentry

CYBER OpSentry™ is the i2IS dual-track capability for improving cybersecurity posture and actively defending against advanced cyberspace threats.  Cybersecurity with i2IS is a dynamic, vigilant, operational – 24/7 capability.  We conduct our dual-track method in two categories:  Active defense and security controls.  Features of both include:



24/7 vigilance

Establish baseline

Real-time awareness

Monitor & test

Real-time defense

Systemic updating

Incident Response & Remediation

Restore baseline

CYBER OpSentry™  can be installed on-site with security services conducted internally or through managed service support from i2IS; or, i2IS can provide comprehensive remote managed security services from the i2IS Network Operations Center (NOC).  The Active Defense track ensures that malicious activity is identified at the network internet access point (ingress/egress), and enables network administrators to remediate threats immediately.  The Security Controls track uses industry best practices to ensure proper configuration management, vulnerability assessment and penetration testing so that a security baseline is established – and in the event of a compromise, restored. 

back to the top



The best technological security solutions can be quickly and easily defeated by network users – and the current threats from cyberspace regularly use social engineering techniques to trick users into errors that enable unauthorized access to your organization network.  i2IS addresses this vulnerability through expert training – training designed to modify human behavior. 

Users commonly use the Internet – surfing, emailing, tweeting, texting and downloading.  Awareness of threats among users is woefully deficient.  Many vendors provide “awareness training”.  Few, however, modify behavior in ways that align with the security plans of IT managers, compliance directors, or the security strategy of executive leadership.

CYBER CITIZENSHIP™ is designed to instill user ‘ownership’ for their online behavior.  Its purpose is to add a training control to one of the many risks emerging from cyberspace. 

i2IS leverages the industry-acclaimed training methodology of Imprimis, Inc. (i2).  i2 led the  course development for the establishment of the US Army Ground-Based Mid-Course Defense Training and Education Center (GTEC).  The GTEC, with Imprimis functioning as project manager and lead trainer for the past ten years, received the Training Center of Excellence Accreditation through the US Army in 2005 and revalidated in 2008.  This world class approach to training includes Instructional System Design (ISD) methodology and Interactive Media Instruction (IMI), initiated through a training baseline and proceeding with a series of managed spiral upgrades.  Additional methodology information can be found at http://www.imprimis-inc.com/i2WebSite/Capability/index.php

back to the top


Assessing risk is an on-going process.  Certain compliance regimes require a written security plan.  While a good first step, the i2IS methodology incorporates a strategic framework to ensure all components are integrated into a comprehensive cybersecurity posture.  Training, metrics, compliance and oversight, enforcement, and incident response must be incorporated in a governance structure to enable an organization to implement, execute, monitor and improve its overall cybersecurity defense capabilities. 

i2IS also leverages its cross-disciplinary approach, especially law, privacy and compliance expertise, to ensure customers implement a governance strategy that addresses all applicable risk mitigation considerations. 

back to the top

Cybersecurity Consulting

At i2IS, the team’s executive-level, functional and programmatic, government, and industry background enables informed thinking and creativity that helps organizations in multiple ways:  alternative risk mitigation strategies, cybersecurity insurance, strategic cybersecurity business development, incident response, culture change agent, public-private partnerships, information sharing frameworks, and “Reasonable Security” advising.  In short, we can help you understand cybersecurity risks and opportunities, and the gamut of cybersecurity issue areas (scientific, societal, privacy, governmental and private sector). 

The end-to-end security design and implementation solution is offered through our consulting services.

We developed CYBER INGENUITY™ because the single-discipline approach does not adequately address the asymmetric nature of cybersecurity. 

back to the top

For additional information, please contact info@i2iscorp.com


  • Interview with the CISO of the State of Colorado
  • For more videos click here.
    Nationwide arts and crafts chain Michaels Stores Inc. said today that two separate, eight-month-long security breaches at its stores last year may have exposed as many as 3 million customer credit and debit cards.
    Oracle has pushed a critical patch update for its Java SE platform that fixes at least 37 security vulnerabilities in the widely-installed program. Several of these flaws are so severe that they are likely to be exploited by malware or attackers in the days or weeks ahead. So -- if you have Java installed -- it is time to update (or to ditch the program once and for all).
    Computer hard drive maker LaCie has acknowledged that a hacker break-in at its online store exposed credit card numbers and contact information on customers for the better part of the past year. The disclosure comes almost a month after the breach was first disclosed by KrebsOnSecurity.
    Many companies believe that if they protect their intellectual property and customers' information, they've done a decent job of safeguarding their crown jewels from attackers. But in an increasingly common scheme, cybercriminals are targeting the Human Resources departments at compromised organizations and rapidly filing fraudulent federal tax returns on all employees.
    In the wake of widespread media coverage of the Internet security debacle known as the Heartbleed bug, many readers are understandably anxious to know what they can do to protect themselves. Here's a short primer.