your Trusted Security Guide

Get expert advice & a specialized plan

real doctors of Science in Cybersecurity

Diagnosing and limiting cybersecurity injuries one prescription at a time™

  • Bipartisan Campaign Security

    Our campaign security team helps campaigns, candidates, and their families secure their digital footprint by providing cutting-edge technologies, robust encryption methods, and comprehensive training for campaign staff on both sides of the aisle.

  • vCISO Advisory

    Does cybersecurity have an independent seat at the table in your organization? Our experts have built and improved security programs while helping organizations avoid, mitigate, transfer, and accept risks.

  • Security Awareness Training

    Have you invested in securing the weakest link in your organization? Our experts have developed custom security awareness training and implemented commercially off-the-shelf training to improve end-users cyber hygiene.

  • Expert Witness/Litigation Support

    Need expertise for an upcoming or ongoing civil or criminal court proceeding? Our experts have been qualified as expert witnesses in U.S. federal courts on technology, cybersecurity, and digital forensics.

  • Insider Threat Investigation

    Think you have a potential disgruntled current or departed employee or contractor? Our experts have proven success in insider threat intervention, monitoring, and investigations using cutting-edge technology, social engineering, and human intelligence.

  • Mobile & Digital Forensics

    Need assistance identifying, preserving, analyzing, documenting, and presenting digital evidence? Our experts have worked with the latest technology and hold industry-leading digital and mobile forensic certifications.

  • VIP Online Protection

    VIP Online Protection provides high-profile executives, individuals, and families with peace of mind to ensure their digital footprint and accounts are secure.

  • Thought Leadership

    Need a quote from an expert or an appearance on an upcoming news segment or conference? Articulating technology and cybersecurity-related information to the masses is an area in which our experts excel. As a result, our experts have been quoted in Compliance Week, Security Magazine, Industry Today, Corporate Compliance Insights, Tech Republic, and Fierce Healthcare.

Can you relate?

You know cybersecurity is important. But it feels overwhelming, intimidating, and expensive…

You want to protect your organization from cybersecurity threats that are always lurking and growing. When you haven’t adequately protected yourself, you feel exposed and hope the odds of not being targeted are in your favor. The problem is that all of us are targets in this modern world.

It’s time to finally take cybersecurity seriously. We know it can be intimidating. That’s why we exist. We are specialists that will guide you through the process of not only becoming secure but feeling secure. Our process helps you understand your specific cybersecurity diagnosis.

We will develop a specialized and budget-conscience plan. You will be adequately protected with the world’s leading technology and best practices.

 

Our process is easy

 
Two people assessing needs

1. Assess Your Needs

Even if don’t even know what to ask, we will guide you along the way

A group of people working on a plan

2. Tailor a Plan

We’ll craft an honest plan specific to your needs that considers your budget

Two people looking at a computer implementing a plan

3. Implement the Plan

We will lead the project to quickly implement your step-by-step solution

 

Ready to get started?

Dr. Stephen Boyce CEO of The Cyber Doctor

In Expert Hands With Dr. Stephen Boyce

Dr. Stephen Boyce is the CEO & President at The Cyber Doctor.  He is an experienced Cybersecurity professional with a demonstrated history working in federal law enforcement, private sector, public service, & higher education.  He serves as a trusted advisor to politicians, lawyers (Am Law 200 & AUSAs), judges, CEOs, Boards of Directors, executive committees, CISOs, CIOs, CTOs, CPOs, and GCs.

Prior to creating The Cyber Doctor, Stephen served as a vCISO/Principal Consultant at Unit 42 by Palo Alto Networks (The Crypsis Group), where he led and managed a diverse set of cyber investigations, including but not limited to insider threat, bad leaver, departed employee, ransomware, business email compromise (BEC), trade secret & intellectual property theft, cloud data exposure, divorce disputes, cyber extortion & harassment, securities fraud, & entertainment disputes.  In his vCISO capacity, Dr. Boyce served as vCISO for a $2B multinational conglomerate where he created a security program from the ground up by identifying the roles and responsibilities of the new organization, evaluating a managed security service provider (MSSP) to augment the internal security operations center (SOC), and aligning their policies to ISO 27001 and CIS standards.

Dr. Boyce spent his federal government career supporting criminal & national security investigations at the Federal Bureau of Investigation and working on cyber diplomacy at the U.S. Department of State.  During his federal government career, Dr. Boyce represented the U.S. internationally as a diplomat working on various working groups, committees, and projects.

Dr. Boyce holds a Doctorate of Science (DSc.) - Cybersecurity, Masters of Science - Cybersecurity, and Bachelors of Science - Information Technology from Marymount University.

Global Reach.
world-class Work.

Our clients are governments, agencies, private institutions, and businesses in countries around the world

Headquartered in the United States

Certifications & Associations

GIAC certification logo
Cellebrite Certified Operator
ISAC Certified Information Security Manager
High Technology Crime Investigation Association (HTCIA)
InfraGuard.png
Information Systems Audit and Control Association (ISACA)

FAQs

What can my organization do to prevent a Ransomware attack?

Ransomware attacks are a by-product of poor organizational cybersecurity and information technology practices. Our process is three-tiered and includes humans, processes, and technology:

  1. Our security awareness training employs organizations to improve their employee's and contractor's cyber hygiene to spot signs of social engineering and include phishing simulations and tabletop exercises.

  2. Through our vCISO advisory services, we have created organizational processes and policies around incident response planning, asset management, software restriction policies, identification of crown jewels, and created in-house and outsourced security operations centers.

  3. Our experts are well versed in assessing and implementing the necessary technology to limit the impact of ransomware. Technical controls like multifactor authentication, endpoint detection, response (EDR), vulnerability management, network segmentation, and use of cyber threat intelligence are some of the many technologies we recommend.

Where can I report a suspected cybercrime?

Reporting cybercrime depends on the country where the suspected crime was committed and the laws.

Australia
Canada
Europe/United Kingdom
United Arab Emirates
United States

Can digital & mobile forensic services be performed remotely?

Cloud-based digital forensics can be performed remotely; however, traditional digital forensics of smartphones, computers, vehicles, and drones will require physical access.

What digital forensic methodology does The Cyber Doctor use?

We follow a combination of the National Institute of Standards and Technology, the Scientific Working Group on Digital Evidence, and ISO/IEC 27037.

Are retainers required?

Retainers are required for expert witness/litigation support, mobile & digital forensics services.

Is The Cyber Doctor tool/vendor agnostic?

At The Cyber Doctor, LLC, we have worked with the most leading and cutting-edge cybersecurity and digital forensics products and vendors; however, we will not recommend a specific product or vendor solely based on a market research report.