LEADERSHIP

LEADERSHIP

LEADERSHIP

Learn more about leadership at Unit 221B

Learn more about leadership at Unit 221B

Learn more about leadership

at Unit 221B

LEADERSHIP

Learn more about leadership

at Unit 221B

""
Lance James

Lance James

Chief Executive Officer

Lance James is a highly experienced information security specialist with over 25 years in the field. He has a programming, network security, digital forensics, malware research, cryptography, counterintelligence, and executive leadership background.

""
Lance James

Lance James

Chief Executive Officer

Lorem ipsum dolor sit amet,

consectetur adipiscing elit. Sed

euismod dui vitae dolor viverra,

sit amet interdum tellus congue. Nunc

vitae tellus risus. Morbi venenatis

massa in dictum iaculis.

""
Lance James

Lance James

Chief Executive Officer

Lorem ipsum dolor sit amet,

consectetur adipiscing elit. Sed

euismod dui vitae dolor viverra,

sit amet interdum tellus congue. Nunc

vitae tellus risus. Morbi venenatis

massa in dictum iaculis.

""
Lance James

Lance James

Chief Executive Officer

Lance James is a highly experienced information security specialist with over 25 years in the field. He has a programming, network security, digital forensics, malware research, cryptography, counterintelligence, and executive leadership background.

""
Lance James

Lance James

Chief Executive Officer

Lorem ipsum dolor sit amet,

consectetur adipiscing elit. Sed

euismod dui vitae dolor viverra,

sit amet interdum tellus congue. Nunc

vitae tellus risus. Morbi venenatis

massa in dictum iaculis.

""
Lance James

Lance James

Chief Executive Officer

Lance James is a highly experienced information security specialist with over 25 years in the field. He has a programming, network security, digital forensics, malware research, cryptography, counterintelligence, and executive leadership background.

""
Jaleesa James

Jaleesa James

President

As an avid researcher of our human condition, Jaleesa James studies neuroscience and psychology at Rutgers School of Graduate Studies while pursuing a Doctoral Program in Neuroscience and Addiction.

""
Jaleesa James

Jaleesa James

President

As an avid researcher of our human condition, Jaleesa James studies neuroscience and psychology at Rutgers School of Graduate Studies while pursuing a Doctoral Program in Neuroscience and Addiction.

""
Jaleesa James

Jaleesa James

President & Founder

As an avid researcher of our human condition, Jaleesa James studies neuroscience and psychology at Rutgers School of Graduate Studies while pursuing a Doctoral Program in Neuroscience and Addiction.

""
Jaleesa James

Jaleesa James

President

As an avid researcher of our human condition, Jaleesa James studies neuroscience and psychology at Rutgers School of Graduate Studies while pursuing a Doctoral Program in Neuroscience and Addiction.

""
Jaleesa James

Jaleesa James

President

As an avid researcher of our human condition, Jaleesa James studies neuroscience and psychology at Rutgers School of Graduate Studies while pursuing a Doctoral Program in Neuroscience and Addiction.

""
Jaleesa James

Jaleesa James

President & Founder

As an avid researcher of our human condition, Jaleesa James studies neuroscience and psychology at Rutgers School of Graduate Studies while pursuing a Doctoral Program in Neuroscience and Addiction.

""
Charles Ambuhl

Charles Ambuhl

Chief Operations Officer

Charles Ambuhl has more than 35 years of experience in the IT benchmarking industry, Cybersecurity, and Compliance with the past 15 years focused on increasing the business benefit from investment in information technology and processes.

""
Charles Ambuhl

Charles Ambuhl

Chief Operations Officer

Charles Ambuhl has more than 35 years of experience in the IT benchmarking industry, Cybersecurity, and Compliance with the past 15 years focused on increasing the business benefit from investment in information technology and processes.

""
Charles Ambuhl

CHARLES AMBUHL

Chief Operations Officer

& Co-Founder

Charles Ambuhl has more than 35 years of experience in the IT benchmarking industry, Cybersecurity, and Compliance with the past 15 years focused on increasing the business benefit from investment in information technology and processes.

""
Charles Ambuhl

Charles Ambuhl

Chief Operations Officer

Charles Ambuhl has more than 35 years of experience in the IT benchmarking industry, Cybersecurity, and Compliance with the past 15 years focused on increasing the business benefit from investment in information technology and processes.

""
Charles Ambuhl

Charles Ambuhl

Chief Operations Officer

Charles Ambuhl has more than 35 years of experience in the IT benchmarking industry, Cybersecurity, and Compliance with the past 15 years focused on increasing the business benefit from investment in information technology and processes.

""
Charles Ambuhl

CHARLES AMBUHL

Chief Operations Officer

& Co-Founder

Charles Ambuhl has more than 35 years of experience in the IT benchmarking industry, Cybersecurity, and Compliance with the past 15 years focused on increasing the business benefit from investment in information technology and processes.

""
Allison Nixon

Allison Nixon

Chief Research Officer

Allison’s well-known for her original threat research in the areas of DDoS attribution, cybercrime attribution, and criminal communities. She has been a prolific background source for numerous investigations and articles that focus on the post-breach issue of “who dunnit?“.

""
Allison Nixon

Allison Nixon

Chief Research Officer

Allison’s well-known for her original threat research in the areas of DDoS attribution, cybercrime attribution, and criminal communities. She has been a prolific background source for numerous investigations and articles that focus on the post-breach issue of “who dunnit?“.

""
Allison Nixon

ALLISON NIXON

Chief Research Officer

Allison’s well-known for her original threat research in the areas of DDoS attribution, cybercrime attribution, and criminal communities. She has been a prolific background source for numerous investigations and articles that focus on the post-breach issue of “who dunnit?“.

""
Allison Nixon

Allison Nixon

Chief Research Officer

Allison’s well-known for her original threat research in the areas of DDoS attribution, cybercrime attribution, and criminal communities. She has been a prolific background source for numerous investigations and articles that focus on the post-breach issue of “who dunnit?“.

""
Allison Nixon

Allison Nixon

Chief Research Officer

Allison’s well-known for her original threat research in the areas of DDoS attribution, cybercrime attribution, and criminal communities. She has been a prolific background source for numerous investigations and articles that focus on the post-breach issue of “who dunnit?“.

""
Allison Nixon

ALLISON NIXON

Chief Research Officer

Allison’s well-known for her original threat research in the areas of DDoS attribution, cybercrime attribution, and criminal communities. She has been a prolific background source for numerous investigations and articles that focus on the post-breach issue of “who dunnit?“.

""
Mark Rasch

Mark Rasch

Chief Legal Officer

Formerly an FBI Prosecutor, Mark created the United States Department of Justice Computer Crime Unit, which included the development of the Computer Fraud and Abuse Act (CFAA) and its’ cyber forensics practices.

""
Mark Rasch

Mark Rasch

Chief Legal Officer

Formerly an FBI Prosecutor, Mark created the United States Department of Justice Computer Crime Unit, which included the development of the Computer Fraud and Abuse Act (CFAA) and its’ cyber forensics practices.

""
Mark Rasch

MARK RASCH

Chief Legal Officer

Formerly an FBI Prosecutor, Mark created the United States Department of Justice Computer Crime Unit, which included the development of the Computer Fraud and Abuse Act (CFAA) and its’ cyber forensics practices.

""
Mark Rasch

Mark Rasch

Chief Legal Officer

Formerly an FBI Prosecutor, Mark created the United States Department of Justice Computer Crime Unit, which included the development of the Computer Fraud and Abuse Act (CFAA) and its’ cyber forensics practices.

""
Mark Rasch

Mark Rasch

Chief Legal Officer

Formerly an FBI Prosecutor, Mark created the United States Department of Justice Computer Crime Unit, which included the development of the Computer Fraud and Abuse Act (CFAA) and its’ cyber forensics practices.

""
Mark Rasch

MARK RASCH

Chief Legal Officer

Formerly an FBI Prosecutor, Mark created the United States Department of Justice Computer Crime Unit, which included the development of the Computer Fraud and Abuse Act (CFAA) and its’ cyber forensics practices.

""
Shaun Gallagher

Shaun Gallagher

Chief Technology Officer

Shaun Gallagher is a subject matter expert in information security, Threat Intelligence, and Machine Learning, and has developed scaling software solutions with prominent Threat Intelligence organizations.

""
Shaun Gallagher

Shaun Gallagher

Chief Technology Officer

Shaun Gallagher is a subject matter expert in information security, Threat Intelligence, and Machine Learning, and has developed scaling software solutions with prominent Threat Intelligence organizations.

""
Shaun Gallagher

SHAUN GALLAGHER

Chief Technology Officer

Shaun Gallagher is a subject matter expert in information security, Threat Intelligence, and Machine Learning, and has developed scaling software solutions with prominent Threat Intelligence organizations.

""
Shaun Gallagher

Shaun Gallagher

Chief Technology Officer

Shaun Gallagher is a subject matter expert in information security, Threat Intelligence, and Machine Learning, and has developed scaling software solutions with prominent Threat Intelligence organizations.

""
Shaun Gallagher

Shaun Gallagher

Chief Technology Officer

Shaun Gallagher is a subject matter expert in information security, Threat Intelligence, and Machine Learning, and has developed scaling software solutions with prominent Threat Intelligence organizations.

""
Shaun Gallagher

SHAUN GALLAGHER

Chief Technology Officer

Shaun Gallagher is a subject matter expert in information security, Threat Intelligence, and Machine Learning, and has developed scaling software solutions with prominent Threat Intelligence organizations.

""
May Chen-Contino

May Chen-Contino

Chief Revenue Officer

May has spent her career focused

on scale and growth in various

industries such as cybersecurity,

SaaS technology, eCommerce, and

B2B marketing.

""
May Chen-Contino

May Chen-Contino

Chief Revenue Officer

May has spent her career focused

on scale and growth in various

industries such as cybersecurity,

SaaS technology, eCommerce, and

B2B marketing.

""
May Chen-Contino

MAY CHEN-CONTINO

Chief Revenue Officer

May has spent her career focused

on scale and growth in various

industries such as cybersecurity,

SaaS technology, eCommerce, and

B2B marketing.

""
May Chen-Contino

May Chen-Contino

Chief Revenue Officer

May has spent her career focused

on scale and growth in various

industries such as cybersecurity,

SaaS technology, eCommerce, and

B2B marketing.

""
May Chen-Contino

May Chen-Contino

Chief Revenue Officer

May has spent her career focused

on scale and growth in various

industries such as cybersecurity,

SaaS technology, eCommerce, and

B2B marketing.

""
May Chen-Contino

MAY CHEN-CONTINO

Chief Revenue Officer

May has spent her career focused

on scale and growth in various

industries such as cybersecurity,

SaaS technology, eCommerce, and

B2B marketing.

""
Andriy Noble

Andriy Noble

VP of Security

Andriy Noble has spent the last ten

years protecting enterprise

companies, through both consulting

and employee roles, while honing his

expertise in both the attack and

defense disciplines.

""
Andriy Noble

Andriy Noble

VP of Security

Andriy Noble has spent the last ten

years protecting enterprise

companies, through both consulting

and employee roles, while honing his

expertise in both the attack and

defense disciplines.

""
Andriy Noble

Andriy Noble

VP of SECURITY

Andriy Noble has spent the last ten

years protecting enterprise

companies, through both consulting

and employee roles, while honing his

expertise in both the attack and

defense disciplines.

""
Andriy Noble

Andriy Noble

VP of Security

Andriy Noble has spent the last ten

years protecting enterprise

companies, through both consulting

and employee roles, while honing his

expertise in both the attack and

defense disciplines.

""
Andriy Noble

Andriy Noble

VP of Security

Andriy Noble has spent the last ten

years protecting enterprise

companies, through both consulting

and employee roles, while honing his

expertise in both the attack and

defense disciplines.

""
Andriy Noble

Andriy Noble

VP of SECURITY

Andriy Noble has spent the last ten

years protecting enterprise

companies, through both consulting

and employee roles, while honing his

expertise in both the attack and

defense disciplines.