End-to-end
Cybersecurity
for Your Business Needs


The CyberdomeUSA team is comprised of globally-recognized, pioneering cybersecurity experts who can assess, construct, design, and provide end-to-end innovative, safe work & life environments specifically adapted for your business needs in any industry.


OUR SERVICES

What We Offer

CyberdomeUSA offers end-to-end security, ranging from analyzing security risks to implementing solutions to solve your security concerns.

Design & Architect

Following Zero Trust Strategy (June 2022) our team has been at the forefront of designing and architecting solutions, including new technology development to offer state-of-the-art practices, protocols, and strategy to protect your infrastructure, network, servers, edge-devices, applications, and data; including comprehensive workforce development.

Given the plethora of thousands of tools and technology available in the marketplace, it is imperative that a seasoned cybersecurity design and architecture team takes an inventory of your assets and develops a robust and sustainable solution for a superior secure ecosystem. Towards this end, we have established a Center of Excellence for Cybersecurity Professional Services (COE for CPS) comprising outstanding specialists and subject matter experts who can custom design solutions and support you in a trusted way.

Implementation

Although your business may have some internal IT staff, it may need selective competencies to strengthen overall cybersecurity implementation. We can offer custom solutions to your specific tools, technology, and talent gaps from time to time. CyberdomeUSA has its own proprietary technology solutions and is an authorized seller of several other mainstream software products. These can be bundled as part of our end-to-end solution or licensed to our customers.

CyberdomeUSA has several strategic partnerships with OEMs and other service providers to be able to meet all clients’ needs.

Professional Services

Certain specialist services can be provided to our clients on an as needed or sustained basis (e.g. Ciso-as-a-Service, Field CISO).

Security Risk Assessment

Our experienced and certified cybersecurity professionals can audit, assess, and evaluate the business risk of your existing IT infrastructure, identity access management (IAM), processes, policies, compliance, data storage, usage in the cloud or in-house, and other security vulnerabilities.

GOVERNANCE, RISK, & COMPLIANCE (GRC)

Governance, Risk, and Compliance (GRC) audits & assessments provide visibility into your current security setup and assist you in becoming compliant.

Cybersecurity Maturity Model Certification (CMMC)

Our leadership team, having had extensive work experience in leading Fortune 500 corporations, Federal Agencies, and Government Organizations, have been pioneering CMM levels in technology for more than 30 years. The Cybersecurity Maturity Model Certification (CMMC) program is designed by the federal administration along with the DoD to enforce the protection of sensitive unclassified information that is shared by the Department with its contractors and subcontractors. Our professional team can help you accomplish optimal CMM Certification to enable you to do business on any government contract. This certification is virtually going to become an expected (mandatory) standard to do any job. We can help you.

Cybersecurity Insurance Maturity Assessment

Our insurance maturity assessment models developed by outstanding experts help you minimize your cybersecurity insurance cost. This is further optimized with our network of over 40 insurers who offer the most compatible plans to meet your cyber insurance needs year over year.

Cyber Academy

Ready your business for tomorrow's cyber threats, today!

Management Bootcamps
  • Target Audience: CISO, CIO/CTO, Board Members, C-Suite, Investors
  • Focused on governance, risk, & compliance (GRC)
  • Understanding of organization level as well as industry centric business risks
  • Understanding of ransomware, DDOS, phishing attacks
  • Essential focus on crisis management and decision making capabilities
STAFF AWARENESS PROGRAMS
  • Strengthening the weakest link in any organization
  • Gamified learning experience combined with reward based model – unique design with proven results
  • Comprehensive coverage for technology, tools, & policies
  • Video library with ever growing collection
  • Encouraging employee base to get benchmarked with latest technologies and ensure periodic knowledge upgrade
CYBER RESILIENCE CERTIFICATION PROGRAMS
  • Customized Certificate Programs aligned to industry needs
  • Our programs are aligned with the National Institute of Standards and Technology (NIST) and National Initiative for Cybersecurity Education (NICE) framework
  • Certification programs also empower organizations to train key staff in security specific areas, like ISO 27001
  • Professional expertise and consulting capabilities to conduct preparatory sessions for industry benchmarked certifications
  • Essential focus on crisis management and decision-making capabilities
INDUSTRY-SPECIFIC TRAINING
  • CyberdomeUSA understands each industry has unique challenges and security issues, which require customization in terms of awareness and next-generation training programs
  • Domain-centric training combined with industry know-how
  • Specific focus for PCI-DSS (Finance), HIPAA & HITECH (Healthcare)
  • Special trainings for public sector, municipalities, and city councils with a focus on Cyber Resilience Awareness


Flexibility to conduct in-person, hybrid, or online trainings depending on your needs.

Protect your business from evolving cyber threats with our 24/7 security monitoring and management. Our comprehensive portfolio includes:

Email Security

Protect email channels from malware, spam and phishing attacks with our advanced filtering and quarantine services.

Phishing Simulations

Improve employee security awareness through simulated phishing tests and training tailored to your organization.

Penetration Testing

Identify security gaps through white, gray, and black box compromised network modeling before real attackers find them. Our experts perform penetration tests using the same techniques as attackers to simulate hacking activities from outside and within your systems to locate weaknesses.

Identity & Access Management

Centrally govern user access privileges to applications and data across hybrid systems seamlessly with just-in-time, least privileged access and zero-trust security models. Automatically provision and deprovision access based on ongoing verification of needing-to-know.

Security Event Monitoring (SIEM)

Leverage AI/ML and analytics to detect even stealthy threats across endpoints, networks and cloud environments in real-time.

Security Orchestration & Response (SOAR)

Automate processes to prioritize, investigate and remediate incidents across disparate security tools for fast response.

Threat Hunting

Proactively search for malicious indicators to identify adversarial tactics, techniques and procedures missed by signature-based defenses.

Vulnerability Management

Continuously assess systems for known vulnerabilities and monitor compliance with policies and best practices.

At CyberdomeUSA, we manage your data center needs so you can concentrate on your core business. We offer a full suite of flexible and scalable cloud solutions including:

Data Storage & Protection

Rely on our experts to keep your data safe and accessible anytime through secure backup and disaster recovery solutions that protect your business from unplanned outages.

Platform-as-a-Service (PaaS)

Develop efficient cloud-native applications on our fully managed platform services without lengthy deployment cycles. Focus on innovation instead of infrastructure management. Our team can help you onboard cloud security services.

Software-as-a-Service (SaaS)

Access best-in-class business applications from any device without expensive upfront costs or long-term commitments. Get the solutions you need to maximize productivity.

Infrastructure-as-a-Service (IaaS)

Leave infrastructure concerns to us while you tap into elastic computing power, storage and networking on demand. Scale as you grow with automatic maintenance and updates. Our team has had hands on experience of designing and building IT infrastructure.

OUR SERVICES

Center Of Excellence for Cybersecurity Professional Services

CyberdomeUSA is continuously updating, upskilling, and upgrading its own excellent pool of professional talent, knowledge, and tools to help improve the security environment of our customers. We complement the resources of our clients in every way, as no organization can optimally be ready on its own at all times. This is especially true in the case of Cybersecurity, as it’s an ever-evolving and complex field of emerging digital tools, technologies, threats, incidents, and attacks that can disrupt our daily work environment, life, and society.

Business risk due to cyber-attacks ought to be managed at all times. Our COE services mitigate that risk and can be provided on a transactional basis or may lead to a strategic engagement. We have experienced professionals and seasoned Subject-Matter-Experts (SMEs) available at your service for a wide spectrum of cybersecurity competencies, including but not limited to:

CISO-as-a-service
Security Risk Analysis
GRC (Governance, Risk and Compliance)
IAM (Identity Access Management)
Cyber Insurance
Cyber Threat Intelligence
Strategy for IT and OT Fusion
SOC Management (Security Operations Center)
Design and Architect Cyber Solutions
Workforce Development Programs
Software Module Development
Wes
Spencer

Cyber Insurance
Workforce Development
Banking
Kenyatte
Simuel

CISO-As-a-Service
Security Risk Analysis
IAM
CTI
Parag
Vaishnav

CISO-As-a-Service
Security Risk Analysis
IAM CTI
SOC Strategy for IT/OT
Design & Architecture
Indu
Singh

Cybersecurity
Business Strategy
Leadership
Smart Cities
Digital Transformation
IT/OT Fusion
Michael
Oehler

Security Risk Analysis
GRC Compliance CTI
Strategy for IT/OT
Design & Architecture
Workforce Development
Counterterrorism
Negotiation
Jitu
Chandna

Field CISO
Security Risk Analysis
Forensics
Data Loss Prevention
Security Engineering
Amit
Sharma

GRC Compliance
Cyber Insurance
Banking
Paul
Kankwende

CISO-As-a-Service
Security Risk Analysis
GRC Compliance
IAM CTI
SOC Management
Strategy for IT/OT
Design & Architecture
Cameron
Loepker

CISO-As-a-Service
Security Risk Analysis
Cyber Insurance
Strategy for IT Roadmap
Design & Architecture
CMMC
Adolph
Barclift

CISO-As-a-Service
Security Risk Analysis
Cyber Insurance
Strategy for IT Roadmap
Design & Architecture
Jon
Grant

CISO-As-a-Service
Security Risk Analysis
Cyber Insurance
Strategy for IT Roadmap
Design & Architecture
Kyla
Guru

Workforce Development
K-12 Cyber Education

Our Values

Adapt & Align

Adapt to your environment without compromising your core values. Align your actions with a sharp focus on delighting your customers while looking for opportunities to learn from everyone around you.

Boundaryless

Be a resource to others. Do not be a turf protector. Learn to thrive in insecurity. Be Bold. We foster respect, humility, and inclusivity to create a boundaryless environment for everyone to thrive and unleash their full potential.

Create

Nurture and apply your creativity. All the time. Ask yourself: What is a better way to do and improve your quality of life, products, and services?

Dream

Endeavor, persevere, and pursue your dreams. Never give up. No fears. No one can innovate unless you dream big of solving a major problem in your own creative way.

Excel

Pursuit of Excellence is our cherished goal by building an outstanding team who can imbibe and inspire the same values and operating DNA in everyone to scale, grow and sustain business profitably.

ABOUT US

Meet our Leadership

Suresh
Sharma

Chief Executive Officer

An internationally well-known former GE executive, Suresh, for decades, has been successfully operating, energizing, and growing cutting-edge companies across the globe. Mr. Sharma obtained his wide-ranging expertise with years of hands-on experience in setting up operations, sourcing, engineering, and manufacturing enterprises in over 15 different countries. He is an inspiring and agile leader who, after having spearheaded several landmark business initiatives in top Fortune 500 companies, adapted himself to become a successful entrepreneur by leading five different startups and a partner in investment funds. His leadership generated several billion dollars of value for its stakeholders.

Now, as CEO of CyberdomeUSA, he’s focusing his acute instincts and exemplary proficiencies on the growth of deep tech companies across multiple verticals.

He’s also riveted audiences as a renowned speaker on innovation and business growth – organic or inorganic. He’s captivated readers as a prolific author, having penned multiple business books. Undoubtedly, his pool of enthusiasts continues to grow. He holds advanced degrees and training in engineering and business from India, UK, and USA. No wonder so many think the world of him.


Jonathan Curran

Chief Information
Security Officer

Having executive leadership roles at Pearson, QCR Holdings, and Seraphim Logic, he has pioneered AI-based cyber defenses and post-quantum cryptographic solutions to data security risks. With expertise in offensive and defensive operations, he has overseen compliance audits and trained DoD personnel. For over a decade, he has built a proven track record of strategic innovation and driving success through technology development.
Certs: LCP, CCA, CISM, MCP, MCTS, CompTIA Security+ CE, A+ CE
Jim Ashby III

Executive Director
of Cyber Academy

Having over 17 years of experience as a teacher, coach, and mentor, as well as a Masters in Human Resource Mgt., he is passionate about connecting people, helping relationships thrive, and unleashing the full potential of the 21st-century digital workforce, with a particular emphasis on the Ohio Valley. He seeks to lead by example: learning emerging technologies and trends, first transforming himself, and hoping he will inspire others.
Current Certification Training: ITIL 4 Foundations
Vic Chauhan

Strategic
Business Advisor

With 30+ years’ executive experience developing strategy & solutions in both the commercial and public sectors, Vic has advised the US government, Europe/NATO, India, Saudi Arabia, and served in senior roles at Deloitte, CSC, and Northrop Grumman. He pioneered the design of Smart and Safe Cities, with expertise in Cybersecurity, Artificial Intelligence / Machine Learning, and Digital Engineering, and was instrumental in forming US Army and DoD Cyber Commands and shaping the DHS-NIST Cyber Framework.
Jinesh Jasani

Strategic
Technology Advisor

A seasoned IT professional with over 20 years of experience who has implemented a number of large projects in IT management, transformation, cyber resilience, data analytics, and governance. Jinesh possesses hands-on competencies in IT infrastructure planning and deployment, services delivery, product support, portfolio management, and pre-sales consultative support.
Certs: SAFe 4 Program Consultant (SPC), Prince2, ITIL Expert, CCSE (Checkpoint certified security expert), Microsoft Certified Technology Specialist, EXIN Information security

Cindy Baird

Head of Training
Operations

With over two decades of leadership experience in operations, curriculum design, and development in the healthcare industry, Cindy brings a wealth of knowledge to efficiently lead Cyber Academy's training staff in designing, adapting, and tailoring curricula to meet customer needs. Holding an M.B.A. and a Masters in Human Resources, she excels at guiding teams to optimize training for customers.
Craig Cordt

Head of North America
Healthcare Sales

With 25 years of deep domain expertise, he drives customer success with creative sales initiatives in the healthcare industry that include privacy of data and HIPAA compliance with custom cybersecurity solutions. Having worked with companies like Nuance, iMedX, and AGS Health, he brings a legacy of client satisfaction, including those of Premier Health, HCA Gulf Coast, Methodist Healthcare, SCL Health, Allina Health, and others.
Suhas Gandhi

COO for Health Tech
& HIPAA Compliance

MDofficeManager, an established software product of the company for the past 20 years, is led by Suhas. It provides cyber-secure electronic health records for the industry. His exemplary passion for delighting customers is evident in his demonstrated capability of laser-focused attention to detail, diligent implementation, sustained quality operations, and 24/7 customer support. Our products have been in use by about 500 clinics, physician practices, and hospitals.
OUR COMPANY

Meet our Team

Patrick Nkomezi

Cyber Resilience Solutions Associate

Patrick specializes in penetration testing and Security Operations Center functions. With his recent degree in Information Assurance, his passion for providing superior client security solutions is unmistakable. Proactive by nature, his vast work experience also includes general administration, customer-facing operations, and sales.
Current Certification Training: CompTIA Network+, Security+, PenTest+
Kanaiya Patel

Cyber Resilience Solutions Associate

Kanaiya Patel is a cyber engineer with over five years of comprehensive IT experience, including 3+ years specializing in Cybersecurity and privileged user account administration. Kanaiya's extensive expertise in efficiently managing large-scale system migrations and optimizing network performance makes him a valuable asset for our organization and our clients who are seeking robust security solutions.
Ethan Ball

IT Operations
Associate

Ethan brings technical prowess and great customer service to his role on the IT Operations team. Adept at not only traversing the digital realm but also fostering strong interpersonal connections, Ethan is a team player known for his effective communication and collaborative spirit. He constantly seeks opportunities to enhance his skills and contribute meaningfully to the ever-evolving tech landscape.
Certs: CompTIA A+
Jonathan Smith

IT Operations
Associate

Known for his adeptness in troubleshooting and upgrading hardware without service interruption, and his exceptional ability to recommend strategic hardware improvements. His expertise shines in environments with multiple locations and mainframe platforms, where he combines meticulous attention to safety and performance targets with strong organizational skills. John's commitment to teamwork, ability to manage multiple projects, and dedication to ongoing professional development make him a standout in the tech field.

Patricia Brown

Cyber Academy
Training Coordinator

With nearly three decades of experience in adult education, she is a leading Training Coordinator specializing in Learning Management Systems development across various industries. Utilizing the ADDIE model, she revolutionizes training efficiency and enhances learning experiences with tools like Articulate Storyline 360 and Camtasia. Her commitment to innovative education design and specialized programs highlights her passion for empowering professional growth.
Je'Kendra Robinson

Executive Assistant
to CEO

With 25 years of wide-ranging experience in supporting senior executives, congressional offices, and growing organizations, Je’Kendra is also a key member of the global Commercial Operations team. Her contributions range from assisting in market research, aligning customer needs with our delivery capability, ensuring company qualifications for proposals, and preparing collateral material.
Emily Houle

Assistant Editor
Cybersecurity Newsletter

One of the first members to join our Workforce Development team, Emily currently focuses on writing our weekly newsletters. Having won multiple prizes in hackathons and a passion for computer forensics, she is dedicated to promoting cyber-literacy and improving organizational cyber-resilience while pursuing a degree in cybersecurity.
Certs: GFACT
Current Certification Training: Linux+
Doran Martin

Web
Developer

As a former US Navy Cryptologic Analyst, he possesses hands-on insights into threat intelligence, programming and scripting, and analytical skills. Always passionate about acquiring new software competencies, he is currently pursuing his degree in Computer Science. He is a valuable member of the Workforce Development team, focused on delivering instructional content and solving cybersecurity problems.
Current Certification Training: Microsoft Azure Fundamentals
OUR LOCATIONS

Where to find us

Our business operations are in several locations around the USA. Our primary facilities are in Southern Indiana and Georgia.