Welcome to i2IS

Cyberspace Solutions

Our Solutions

CYBER INGENUITY™ is an end-to-end security design and implementation solution.

It addresses all risks with four areas of focus:

  1. Dynamic Command and Control (CYBER OpSentry™)

  2. Executive and Employee Training (CYBER CITIZENSHIP™)

  3. Governance, Oversight and Enforcement

  4. Tailored Cybersecurity Problem-Solving


Dynamic Command and Control

CYBER OpSentry

CYBER OpSentry™ is the i2IS dual-track capability for improving cybersecurity posture and actively defending against advanced cyberspace threats.  Cybersecurity with i2IS is a dynamic, vigilant, operational – 24/7 capability.  We conduct our dual-track method in two categories:  Active defense and security controls.  Features of both include:



24/7 vigilance

Establish baseline

Real-time awareness

Monitor & test

Real-time defense

Systemic updating

Incident Response & Remediation

Restore baseline

CYBER OpSentry™  can be installed on-site with security services conducted internally or through managed service support from i2IS; or, i2IS can provide comprehensive remote managed security services from the i2IS Network Operations Center (NOC).  The Active Defense track ensures that malicious activity is identified at the network internet access point (ingress/egress), and enables network administrators to remediate threats immediately.  The Security Controls track uses industry best practices to ensure proper configuration management, vulnerability assessment and penetration testing so that a security baseline is established – and in the event of a compromise, restored. 

back to the top



The best technological security solutions can be quickly and easily defeated by network users – and the current threats from cyberspace regularly use social engineering techniques to trick users into errors that enable unauthorized access to your organization network.  i2IS addresses this vulnerability through expert training – training designed to modify human behavior. 

Users commonly use the Internet – surfing, emailing, tweeting, texting and downloading.  Awareness of threats among users is woefully deficient.  Many vendors provide “awareness training”.  Few, however, modify behavior in ways that align with the security plans of IT managers, compliance directors, or the security strategy of executive leadership.

CYBER CITIZENSHIP™ is designed to instill user ‘ownership’ for their online behavior.  Its purpose is to add a training control to one of the many risks emerging from cyberspace. 

i2IS leverages the industry-acclaimed training methodology of Imprimis, Inc. (i2).  i2 led the  course development for the establishment of the US Army Ground-Based Mid-Course Defense Training and Education Center (GTEC).  The GTEC, with Imprimis functioning as project manager and lead trainer for the past ten years, received the Training Center of Excellence Accreditation through the US Army in 2005 and revalidated in 2008.  This world class approach to training includes Instructional System Design (ISD) methodology and Interactive Media Instruction (IMI), initiated through a training baseline and proceeding with a series of managed spiral upgrades.  Additional methodology information can be found at http://www.imprimis-inc.com/i2WebSite/Capability/index.php

back to the top


Assessing risk is an on-going process.  Certain compliance regimes require a written security plan.  While a good first step, the i2IS methodology incorporates a strategic framework to ensure all components are integrated into a comprehensive cybersecurity posture.  Training, metrics, compliance and oversight, enforcement, and incident response must be incorporated in a governance structure to enable an organization to implement, execute, monitor and improve its overall cybersecurity defense capabilities. 

i2IS also leverages its cross-disciplinary approach, especially law, privacy and compliance expertise, to ensure customers implement a governance strategy that addresses all applicable risk mitigation considerations. 

back to the top

Cybersecurity Consulting

At i2IS, the team’s executive-level, functional and programmatic, government, and industry background enables informed thinking and creativity that helps organizations in multiple ways:  alternative risk mitigation strategies, cybersecurity insurance, strategic cybersecurity business development, incident response, culture change agent, public-private partnerships, information sharing frameworks, and “Reasonable Security” advising.  In short, we can help you understand cybersecurity risks and opportunities, and the gamut of cybersecurity issue areas (scientific, societal, privacy, governmental and private sector). 

The end-to-end security design and implementation solution is offered through our consulting services.

We developed CYBER INGENUITY™ because the single-discipline approach does not adequately address the asymmetric nature of cybersecurity. 

back to the top

For additional information, please contact info@i2iscorp.com


  • Interview with the CISO of the State of Colorado
  • For more videos click here.
    A Russian man detained in Spain is facing extradition to the United States on charges of running an international cyber crime ring that allegedly stole more than $10 million in electronic tickets from e-tickets vendor StubHub.
    Heads up, bargain shoppers: Financial institutions across the country report that they are tracking what appears to be a series of credit card breaches involving Goodwill locations nationwide. Goodwill Industries International Inc. says it is working with federal authorities on an investigation into these reports.
    Indexeus, a new search engine that indexes user account information acquired from more than 100 recent data breaches, has caught many in the hacker underground off-guard. That's because the breached databases crawled by this search engine are mostly sites frequented by young ne'er-do-wells who are just getting their feet wet in the cybercrime business.
    I've long recommended that small business owners and others concerned about malware-driven bank account takeovers consider adopting a "Live CD" solution, which is a free and relatively easy way of temporarily converting your Windows PC into a Linux operating system. The trouble with many of these Live CD solutions is that they require a CD player (something many laptops no longer have) -- but more importantly - they don't play well with wireless access. Today's post looks at an alternative that addresses both of these issues.
    Oracle today released a security update for its Java platform that addresses at least 20 vulnerabilities in the software. Collectively, the bugs fixed in this update earned Oracle's "critical" rating, meaning they can be exploited over a network without the need for a username and password. In short, if you have Java installed it is time to patch it or pitch it.