LEADERSHIP

LEADERSHIP

LEADERSHIP

Learn more about leadership at Unit 221B

Learn more about leadership at Unit 221B

Learn more about leadership

at Unit 221B

LEADERSHIP

Learn more about leadership

at Unit 221B

""
May Chen-Contino

May Chen-Contino

Chief Executive Officer

May has spent her career focused

on scale and growth in various

industries such as cybersecurity,

SaaS technology, eCommerce, and

B2B marketing.

""
May Chen-Contino

May Chen-Contino

Chief Executive Officer

May has spent her career focused

on scale and growth in various

industries such as cybersecurity,

SaaS technology, eCommerce, and

B2B marketing.

""
May Chen-Contino

May Chen-Contino

Chief Executive Officer

May has spent her career focused

on scale and growth in various

industries such as cybersecurity,

SaaS technology, eCommerce, and

B2B marketing.

""
May Chen-Contino

May Chen-Contino

Chief Executive Officer

May has spent her career focused

on scale and growth in various

industries such as cybersecurity,

SaaS technology, eCommerce, and

B2B marketing.

""
May Chen-Contino

May Chen-Contino

Chief Executive Officer

May has spent her career focused

on scale and growth in various

industries such as cybersecurity,

SaaS technology, eCommerce, and

B2B marketing.

""
May Chen-Contino

May Chen-Contino

Chief Executive Officer

May has spent her career focused

on scale and growth in various

industries such as cybersecurity,

SaaS technology, eCommerce, and

B2B marketing.

""
Lance James

Lance James

Chief Innovations Officer

Lance James is a highly experienced information security specialist with over 25 years in the field. He has a programming, network security, digital forensics, malware research, cryptography, counterintelligence, and executive leadership background.

""
Lance James

Lance James

Chief Innovations Officer

Lorem ipsum dolor sit amet,

consectetur adipiscing elit. Sed

euismod dui vitae dolor viverra,

sit amet interdum tellus congue. Nunc

vitae tellus risus. Morbi venenatis

massa in dictum iaculis.

""
Lance James

Lance James

Chief Innovations Officer

Lorem ipsum dolor sit amet,

consectetur adipiscing elit. Sed

euismod dui vitae dolor viverra,

sit amet interdum tellus congue. Nunc

vitae tellus risus. Morbi venenatis

massa in dictum iaculis.

""
Lance James

Lance James

Chief Innovations Officer

Lance James is a highly experienced information security specialist with over 25 years in the field. He has a programming, network security, digital forensics, malware research, cryptography, counterintelligence, and executive leadership background.

""
Lance James

Lance James

Chief Innovations Officer

Lorem ipsum dolor sit amet,

consectetur adipiscing elit. Sed

euismod dui vitae dolor viverra,

sit amet interdum tellus congue. Nunc

vitae tellus risus. Morbi venenatis

massa in dictum iaculis.

""
Lance James

Lance James

Chief Innovations Officer

Lance James is a highly experienced information security specialist with over 25 years in the field. He has a programming, network security, digital forensics, malware research, cryptography, counterintelligence, and executive leadership background.

""
Jaleesa James

Jaleesa James

President

As an avid researcher of our human condition, Jaleesa James studies neuroscience and psychology at Rutgers School of Graduate Studies while pursuing a Doctoral Program in Neuroscience and Addiction.

""
Jaleesa James

Jaleesa James

President

As an avid researcher of our human condition, Jaleesa James studies neuroscience and psychology at Rutgers School of Graduate Studies while pursuing a Doctoral Program in Neuroscience and Addiction.

""
Jaleesa James

Jaleesa James

President & Founder

As an avid researcher of our human condition, Jaleesa James studies neuroscience and psychology at Rutgers School of Graduate Studies while pursuing a Doctoral Program in Neuroscience and Addiction.

""
Jaleesa James

Jaleesa James

President

As an avid researcher of our human condition, Jaleesa James studies neuroscience and psychology at Rutgers School of Graduate Studies while pursuing a Doctoral Program in Neuroscience and Addiction.

""
Jaleesa James

Jaleesa James

President

As an avid researcher of our human condition, Jaleesa James studies neuroscience and psychology at Rutgers School of Graduate Studies while pursuing a Doctoral Program in Neuroscience and Addiction.

""
Jaleesa James

Jaleesa James

President & Founder

As an avid researcher of our human condition, Jaleesa James studies neuroscience and psychology at Rutgers School of Graduate Studies while pursuing a Doctoral Program in Neuroscience and Addiction.

""
Allison Nixon

Allison Nixon

Chief Research Officer

Allison’s well-known for her original threat research in the areas of DDoS attribution, cybercrime attribution, and criminal communities. She has been a prolific background source for numerous investigations and articles that focus on the post-breach issue of “who dunnit?“.

""
Allison Nixon

Allison Nixon

Chief Research Officer

Allison’s well-known for her original threat research in the areas of DDoS attribution, cybercrime attribution, and criminal communities. She has been a prolific background source for numerous investigations and articles that focus on the post-breach issue of “who dunnit?“.

""
Allison Nixon

Allison Nixon
Chief Research Officer

Allison’s well-known for her original threat research in the areas of DDoS attribution, cybercrime attribution, and criminal communities. She has been a prolific background source for numerous investigations and articles that focus on the post-breach issue of “who dunnit?“.

""
Allison Nixon

Allison Nixon

Chief Research Officer

Allison’s well-known for her original threat research in the areas of DDoS attribution, cybercrime attribution, and criminal communities. She has been a prolific background source for numerous investigations and articles that focus on the post-breach issue of “who dunnit?“.

""
Allison Nixon

Allison Nixon

Chief Research Officer

Allison’s well-known for her original threat research in the areas of DDoS attribution, cybercrime attribution, and criminal communities. She has been a prolific background source for numerous investigations and articles that focus on the post-breach issue of “who dunnit?“.

""
Allison Nixon

Allison Nixon
Chief Research Officer

Allison’s well-known for her original threat research in the areas of DDoS attribution, cybercrime attribution, and criminal communities. She has been a prolific background source for numerous investigations and articles that focus on the post-breach issue of “who dunnit?“.

""
Mark Rasch

Mark Rasch

Chief Legal Officer

Formerly an FBI Prosecutor, Mark created the United States Department of Justice Computer Crime Unit, which included the development of the Computer Fraud and Abuse Act (CFAA) and its’ cyber forensics practices.

""
Mark Rasch

Mark Rasch

Chief Legal Officer

Formerly an FBI Prosecutor, Mark created the United States Department of Justice Computer Crime Unit, which included the development of the Computer Fraud and Abuse Act (CFAA) and its’ cyber forensics practices.

""
Mark Rasch

Mark Rasch
Chief Legal Officer

Formerly an FBI Prosecutor, Mark created the United States Department of Justice Computer Crime Unit, which included the development of the Computer Fraud and Abuse Act (CFAA) and its’ cyber forensics practices.

""
Mark Rasch

Mark Rasch

Chief Legal Officer

Formerly an FBI Prosecutor, Mark created the United States Department of Justice Computer Crime Unit, which included the development of the Computer Fraud and Abuse Act (CFAA) and its’ cyber forensics practices.

""
Mark Rasch

Mark Rasch

Chief Legal Officer

Formerly an FBI Prosecutor, Mark created the United States Department of Justice Computer Crime Unit, which included the development of the Computer Fraud and Abuse Act (CFAA) and its’ cyber forensics practices.

""
Mark Rasch

Mark Rasch
Chief Legal Officer

Formerly an FBI Prosecutor, Mark created the United States Department of Justice Computer Crime Unit, which included the development of the Computer Fraud and Abuse Act (CFAA) and its’ cyber forensics practices.

""
Shaun Gallagher

Shaun Gallagher

Chief Technology Officer

Shaun Gallagher is a subject matter expert in information security, Threat Intelligence, and Machine Learning, and has developed scaling software solutions with prominent Threat Intelligence organizations.

""
Shaun Gallagher

Shaun Gallagher

Chief Technology Officer

Shaun Gallagher is a subject matter expert in information security, Threat Intelligence, and Machine Learning, and has developed scaling software solutions with prominent Threat Intelligence organizations.

""
Shaun Gallagher

Shaun Gallagher
Chief Technology Officer

Shaun Gallagher is a subject matter expert in information security, Threat Intelligence, and Machine Learning, and has developed scaling software solutions with prominent Threat Intelligence organizations.

""
Shaun Gallagher

Shaun Gallagher

Chief Technology Officer

Shaun Gallagher is a subject matter expert in information security, Threat Intelligence, and Machine Learning, and has developed scaling software solutions with prominent Threat Intelligence organizations.

""
Shaun Gallagher

Shaun Gallagher

Chief Technology Officer

Shaun Gallagher is a subject matter expert in information security, Threat Intelligence, and Machine Learning, and has developed scaling software solutions with prominent Threat Intelligence organizations.

""
Shaun Gallagher

Shaun Gallagher
Chief Technology Officer

Shaun Gallagher is a subject matter expert in information security, Threat Intelligence, and Machine Learning, and has developed scaling software solutions with prominent Threat Intelligence organizations.

""
Andriy Noble

Andriy Noble

VP of Security

Andriy Noble has spent the last ten

years protecting enterprise

companies, through both consulting

and employee roles, while honing his

expertise in both the attack and

defense disciplines.

""
Andriy Noble

Andriy Noble

VP of Security

Andriy Noble has spent the last ten

years protecting enterprise

companies, through both consulting

and employee roles, while honing his

expertise in both the attack and

defense disciplines.

""
Andriy Noble

Andriy Noble

VP of Security

Andriy Noble has spent the last ten

years protecting enterprise

companies, through both consulting

and employee roles, while honing his

expertise in both the attack and

defense disciplines.

""
Andriy Noble

Andriy Noble

VP of Security

Andriy Noble has spent the last ten

years protecting enterprise

companies, through both consulting

and employee roles, while honing his

expertise in both the attack and

defense disciplines.

""
Andriy Noble

Andriy Noble

VP of Security

Andriy Noble has spent the last ten

years protecting enterprise

companies, through both consulting

and employee roles, while honing his

expertise in both the attack and

defense disciplines.

""
Andriy Noble

Andriy Noble

VP of Security

Andriy Noble has spent the last ten

years protecting enterprise

companies, through both consulting

and employee roles, while honing his

expertise in both the attack and

defense disciplines.