top of page

Meet The Team

​

​

As discussed throughout this web page, there are vulnerabilities in hardware and software systems we use. Some of these vulnerabilities are weaknesses-  that can be exploited  and used to compromise the system.

These vulnerabilities, combined with threats, add up to the risks  we are exposed to. Risk management is needed to make sure we are prepared just in case those threats become a reality

John E. Donnelly

Founder & Co-Director

 

 

jdonnelly91@yahoo.com

O: 860-941-9262

 

bottom of page