Please hover over each Team Member to learn more:

InfusionPoints LLC, www.InfusionPoints.com
InfusionPoints, LLC — Secure Business Solutions bridges the gap between security and mission needs — from defining key security and privacy requirements, to developing enterprise security architectures, developing enterprise security and privacy roadmaps, and managing, implementing and infusing security into mission critical initiatives. We work with our clients to infuse security and privacy throughout every point in the mission solutions' lifecycle to protect our clients' information, and achieve their security and privacy objectives and goals. InfusionPoints helps our customers with their Cyber Security and Identity, Credential and Access Management (ICAM) challenges. Our team has worked in many rapidly changing environments with a high degree of regulatory requirements for many years. We provide consulting, cyber security and technology support to Retail, Banking, Data Service and Manufacturing industries as well as Federal Civilian Government Agencies.
 
Sumwalt Financial LLC
Sumwalt Financial LLC provides Strategic Information Technology consulting for a variety of commercial and government clients. Sumwalt employs Lean Six Sigma Black Belts to assist clients to incorporate ITIL Foundations and ISO 20000. Sumwalt specializes in incorporating new technologies while maintaining Information Assurance compliance.
 
TSM has 34 years of experience supporting administrative, logistics, readiness and financial projects across DOD and commercial communities. In their Professional Services Division, they are a veteran-owned large business; in their Manufacturing Division, they are a veteran-owned small business. TSM provides solutions to complex problems involving critical analysis and review of requirements, administrative support functions, sustainment of current readiness, utilization of logistics and financial information systems, management of logistics systems and issues, application of advanced management techniques for system reporting requirements, management of administrative processes at all levels of command, and sound and accurate processes for scheduling and running conferences or functions. TSM experience with military aviation includes operational support as well as maintenance and analysis at the organizational, intermediate, and depot levels. TSM has extensive expertise and capability in supporting Headquarters Command and staffs, Computer-based and Web-based Training, program management, engineering, operations support, base realignment and closure analysis and execution, Information Technology support from design to implementation and testing, financial analysis, facility support, technical advisor support, and maintenance requirements assessments.
 
i2IS, a member of the Imprimis, Inc. (i2) family of companies, blends the individual expertise of team members to deliver an integrated, cross-disciplinary approach to address organizational risk from cyberspace threats, as well as social engineered threats to the network enterprise. The parent business model also affords i2IS reach back to DOD space, missile defense, and operations capabilities, as well as engineering and management consulting. The i2IS team’s talent pool includes executive-level expertise related to cybersecurity law, investigation, risk management, intelligence, forensics, cyber-operations, network architecture and technology, law enforcement, federal and state government, public-private partnering, critical infrastructure protection, telecommunications, problem-solving strategies and brand protection. We have designed, managed, and implemented projects involving cybersecurity programs, training, network build, incident remediation, conference organizing, program management, and technology integration for commercial and DOD customers. As a cybersecurity integrator, we assess needs and tailor solutions that incorporate a blend of technology, processes and controls, and training. This All-Risks approach, CYBER INGENUITYTM, draws upon the many skill-sets of our specialized team. The integration of technical and policy outcomes ensures the delivery of a comprehensive solution for our customers. i2IS is a service-disabled, veteran-owned small business.
 
Copper River, provides progressive, program-focused IT solutions based on expert engineering, agile execution and proven past performance. Established in 2006 as a Federally Recognized Alaskan Tribal 8(a), Copper River provides Network Engineering, Systems Engineering, Program Management, and Education Services that deliver a solid framework for uninterrupted operations. As a lead integrator, Copper River promotes a technology agnostic approach. We analyze requirements then, working with the numerous partners and vendors, provide a technology solution within budget constraints according to the specific mission. Copper River has successfully managed multi-site, multi-technology, multi-year deployment contracts and programs for the US Federal Government and a wide variety of commercial clients.