Led by rigorous research
We translate research in digital forensics, secure architectures, and AI/ML safety into usable real-world outcomes.
Cybersecurity consulting
Research-grounded security that ships. We help teams design secure, forensic-ready systems and run practical risk governance without slowing delivery.
Focused, evidence-driven, and implementation-ready.
Research-grounded, operationally practical. Built for teams that need clarity, not noise.
We translate research in digital forensics, secure architectures, and AI/ML safety into usable real-world outcomes.
Practical alignment to frameworks such as NIST and healthcare expectations (HIPAA/HITECH), tailored to your operating reality.
Centralized log management aligned with CISA guidance—configured, documented, and usable for detection, response, and investigation.
Evidence integrity, logging readiness, and incident workflows that reduce chaos when incidents occur.
Example
Outcome: prioritized fixes + an implementation plan to reduce attack surface.
Example
Outcome: security gates + developer workflow that preserves delivery speed.
Example
Outcome: evidence-ready logging + DFIR playbooks for faster response.
Clear deliverables that strengthen resilience without slowing delivery.
Threat modeling, architecture hardening, secure patterns, and design review.
Security gates, CI/CD controls, code review standards, and developer enablement.
Logging, evidence integrity, retention, and forensic-ready system design.
Incident response runbooks, tabletop exercises, and escalation workflows.
Cyber risk management and policy alignment to your operating reality.
Support for controls alignment (e.g., NIST, HIPAA, HITECH) and audit readiness.
Collection, storage, dashboards, and alerting—implemented with documentation and team training.
Robustness, misuse resistance, and responsible deployment for AI-enabled security.
Turn advanced research (NLP/ML/forensics) into actionable security strategy.
Representative outcomes, tailored to your threat landscape and operating constraints.
Short, practical guidance informed by research and real-world security delivery.
Featured insight
The phrase has been diluted into a compliance checkbox. After a decade of engagements, the pattern is consistent: security is treated as a property to be checked rather than a discipline practiced continuously. Here’s what actually changes that.
Read insightInsight
A practical blueprint for shipping faster while reducing risk—without bureaucracy.
ReadInsight
Minimum logging + evidence integrity practices that make investigations faster and defensible.
ReadInsight
Runbooks teams follow under pressure—clear triggers, owners, and escalation.
ReadResearch contributions in digital forensic readiness, secure architectures, and human communication-based cybercrime detection.
About the founder
I founded SB Cyber Lab to close the gap between rigorous security research and what engineering teams can actually ship. My doctoral work spanned digital forensic readiness, secure architectures, and NLP/ML approaches to cybercrime detection — and every engagement I run draws directly on that foundation.
Based in New York City, I work with a small number of clients at a time across financial services, healthcare, and technology — sectors where the cost of getting security wrong is high and the pressure to move fast is real. I bring an academic's precision and a practitioner's instinct for what matters in production.
My ORCID is 0000-0003-0523-2751 — you can see the published research there. The consulting work builds on it.
If you want a focused security program with clear deliverables—not endless theory—this is where we work.
Actively considering CISO, VP Security, Principal Security Architect, and board-level advisory roles — particularly in fintech, healthcare, and AI-enabled infrastructure.
Choose what you need and share a few details. We’ll respond with next steps and a proposed plan.
Response time
24–48 hours (Mon–Fri)
Urgent requests: select “Urgent” below.
What you get