Leadership Regular
William Burke
TSI CYBER

Leadership

Leadership

CISO & Director of Cybersecurity at tsi

20 years in cyber across military, federal, and private sectors

Adjunct Graduate Professor

Holds 15 licenses and certifications

Name platform
William J. Burke IV

CISO & Director of Cybersecurity at TSI

Cyber profile container
licenses & certifications

OSCP

GXPN

GPEN

GCIH

GWAPT

CNSP

CSAP

CySA+

eCPPT

CORIII

GPEN

CNDA

CEH

CEH(M)

Sec+

CISSP

20 years in cyber across military, federal, and private sectors

Deputy Chief of Vulnerability Evaluations at CISA

CEHM Advisor at EC-Council

Speaker at BlackHat, NIST, ISPAB, ATARC, Fox News, HBO Vice

Co-founder of the nation’s red team at DHS

8 years with the United States Air Force

Offsec, NetAdmin, SysAdmin, & educator backgrounds

Adjunct Graduate Professor

Secure a round-the-clock cybersecurity defense team safeguarding your interests every day of the year.

Adjunct Graduate Professor

Sole developer for “The Dark Arts” cybersecurity course

Security expert typing on the laptop

Let's Get Started

To give our team an idea of what kind of services you're interested in, fill out this short form.

    Infrastructure

    LinuxWindowsMAC OS X

    Network

    Number of Employees with access to your network?

    Number of Locations with network access?

    Facility Type

    Government OfficeEnergy / Construction Remote OfficeFinancial / Medical / Legal OfficeProduction Facility / WarehouseCorporate Office / Other OfficeData / Call Center

    Services Needed

    Check All That Apply

    SecurityMonitoringManaging

    Technology Systems

    Check All That Apply

    Server / Cloud / Data StorageFinancial Accounts / Intellectual PropertyEmail / User AccountsNetwork / Wireless InfrastructureVoIP / Video Conference SystemsComputers / Printers / Mobile DevicesSoftware / HardwareWebsite / Software / ApplicationSystem Auditing

    Network Radius

    Employees are issued devices that are allowed offsiteEmployees are issued devices that are to remain onsite

    Security Level

    Check All That Apply

    If we lose our data it would financially impact the companyIf client/customer account information in our system were stolen it would harm our reputation and/or financially impact the companyIf our server/website/system is down we lose money

    Threat Level

    Check All That Apply

    Former employees/clients/customers might still have access to our networkCurrent employees/clients/customers could unknowingly or knowingly compromise our system and/or their accountsCompetitors/Foreign entities could be motivated to attack our network

    Monitoring Level

    Check All That Apply

    The equipment issued to employees needs access and/or surveillance monitoringThe security of our server/network/website needs continuous monitoring for uptime and data integrityOur office/facility needs dedicated access/alarm and/or surveillance monitoring

    Management Level

    Check All That Apply

    Our system requires regular auditingOur employees need policy and procedure training of company technology systemsOur equipment needs ongoing software/hardware/security updatesOur company needs consultation when purchasing and/or implementing new technology systems

    Contact Information

    Contact Name

    Organization Name

    Phone Number

    How Can We Help You?