SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
BUSINESS SUMMARY: 
Mission Critical Global Technology Group (“MCGlobalTech”) is a minority owned, small business founded by industry leaders to provide strategic advisory and consulting services to public and private sector business managers to better align technology and security programs with organizational mission and business goals. 
EXPERTISE SUMMARY: 
Our staff is composed of technical subject matter experts and management level personnel. All management level consultants have over 20+ years experience in Information Security and IT Infrastructure management. All management and technical staff hold industry recognized certifications including CISSP, CISA, CRISC, CEH, PMP, CCSK, CBCP, and ITIL. Our experts combine many decades of experience in industries such as Finance, Healthcare, Manufacturing, Insurance, Education, and Federal and State Government agencies. 
CORE CAPABILITIES: 
• 
Enterprise Information Security Management Services 
• 
IT Infrastructure Management Services 
• 
IT Governance, Risk, and Compliance Services 
• 
IT / Security Program Management Services 
• 
Cloud Computing Security and Migration Services 
SERVICE DELIVERY MODEL: 
WWW.MCGLOBALTECH.COM 
Contact Info 
MCGlobalTech 
1776 I Street, NW 
9th Floor 
Washington, DC. 20006 
(p) 571-249-3932 
(e) info@mcglobaltech.com 
(w) www.mcglobaltech.com 
NAICS Codes: 
518210, 541512, 541512, 
541513, 541519 
Cage Code: 
76X97 
DUNS #: 
967264701 
CUSTOMERS: 
Provided Information 
Security and Compliance Subject Matter Expertise services 
Provided Executive Level Consulting Services in IT Infrastructure Management and Cloud Computing Migration 
Provided Executive level Information Security Program and Risk Management services. 
Provided Executive 
Information Security advisory services.

Contenu connexe

Tendances

Internet threats- How to protect the Africa consumer
 Internet threats- How to protect the Africa consumer  Internet threats- How to protect the Africa consumer
Internet threats- How to protect the Africa consumer Self
 
LaunchTech Named Agency of the Year at Global Excellence Awards
LaunchTech Named Agency of the Year at Global Excellence AwardsLaunchTech Named Agency of the Year at Global Excellence Awards
LaunchTech Named Agency of the Year at Global Excellence AwardsWayne Schepens
 
Webinar: Using iSheets to manage a real estate portfolio
Webinar: Using iSheets to manage a real estate portfolioWebinar: Using iSheets to manage a real estate portfolio
Webinar: Using iSheets to manage a real estate portfolioHighQ
 
Bsu skills and_careers_in_cybersecurity
Bsu skills and_careers_in_cybersecurityBsu skills and_careers_in_cybersecurity
Bsu skills and_careers_in_cybersecuritySandra (Sandy) Dunn
 
Cyber Threat Prevention
Cyber Threat Prevention Cyber Threat Prevention
Cyber Threat Prevention Jonathan Posner
 
Leila Golchehreh - Adaptive Insights - Intro to New EU GDPR Data Privacy Rule...
Leila Golchehreh - Adaptive Insights - Intro to New EU GDPR Data Privacy Rule...Leila Golchehreh - Adaptive Insights - Intro to New EU GDPR Data Privacy Rule...
Leila Golchehreh - Adaptive Insights - Intro to New EU GDPR Data Privacy Rule...Burton Lee
 
SEMTEXX IT Security Services
SEMTEXX IT Security ServicesSEMTEXX IT Security Services
SEMTEXX IT Security ServicesMaris Kocins
 
It consulting san diego ca centrex it
It consulting san diego ca   centrex itIt consulting san diego ca   centrex it
It consulting san diego ca centrex itCentrexITSD
 
The Data Lab - Open Data for Scotland
The Data Lab - Open Data for Scotland The Data Lab - Open Data for Scotland
The Data Lab - Open Data for Scotland 9903089
 
Cade zvavanjanja iot afigf online
Cade zvavanjanja iot afigf onlineCade zvavanjanja iot afigf online
Cade zvavanjanja iot afigf onlineCade Zvavanjanja
 
ISACA’s World Congress Insights 2011
ISACA’s World Congress Insights 2011 ISACA’s World Congress Insights 2011
ISACA’s World Congress Insights 2011 ISACAnews
 
It conference in brazil
It conference in brazilIt conference in brazil
It conference in brazilArtem Rudi
 
Navigating Career Choices in InfoSec - BSides Detroit 2017
Navigating Career Choices in InfoSec - BSides Detroit 2017Navigating Career Choices in InfoSec - BSides Detroit 2017
Navigating Career Choices in InfoSec - BSides Detroit 2017Fernando Montenegro
 
Understanding Blockchain and Its Business Benefits
Understanding Blockchain and Its Business BenefitsUnderstanding Blockchain and Its Business Benefits
Understanding Blockchain and Its Business BenefitsExist
 

Tendances (18)

When network security is not enough
When network security is not enoughWhen network security is not enough
When network security is not enough
 
Internet threats- How to protect the Africa consumer
 Internet threats- How to protect the Africa consumer  Internet threats- How to protect the Africa consumer
Internet threats- How to protect the Africa consumer
 
LaunchTech Named Agency of the Year at Global Excellence Awards
LaunchTech Named Agency of the Year at Global Excellence AwardsLaunchTech Named Agency of the Year at Global Excellence Awards
LaunchTech Named Agency of the Year at Global Excellence Awards
 
Hr resource management
Hr resource managementHr resource management
Hr resource management
 
Webinar: Using iSheets to manage a real estate portfolio
Webinar: Using iSheets to manage a real estate portfolioWebinar: Using iSheets to manage a real estate portfolio
Webinar: Using iSheets to manage a real estate portfolio
 
Bsu skills and_careers_in_cybersecurity
Bsu skills and_careers_in_cybersecurityBsu skills and_careers_in_cybersecurity
Bsu skills and_careers_in_cybersecurity
 
Cyber Threat Prevention
Cyber Threat Prevention Cyber Threat Prevention
Cyber Threat Prevention
 
Conquest capabilities q2 2015 v2
Conquest capabilities q2 2015 v2Conquest capabilities q2 2015 v2
Conquest capabilities q2 2015 v2
 
Sikich Case Study
Sikich Case Study Sikich Case Study
Sikich Case Study
 
Leila Golchehreh - Adaptive Insights - Intro to New EU GDPR Data Privacy Rule...
Leila Golchehreh - Adaptive Insights - Intro to New EU GDPR Data Privacy Rule...Leila Golchehreh - Adaptive Insights - Intro to New EU GDPR Data Privacy Rule...
Leila Golchehreh - Adaptive Insights - Intro to New EU GDPR Data Privacy Rule...
 
SEMTEXX IT Security Services
SEMTEXX IT Security ServicesSEMTEXX IT Security Services
SEMTEXX IT Security Services
 
It consulting san diego ca centrex it
It consulting san diego ca   centrex itIt consulting san diego ca   centrex it
It consulting san diego ca centrex it
 
The Data Lab - Open Data for Scotland
The Data Lab - Open Data for Scotland The Data Lab - Open Data for Scotland
The Data Lab - Open Data for Scotland
 
Cade zvavanjanja iot afigf online
Cade zvavanjanja iot afigf onlineCade zvavanjanja iot afigf online
Cade zvavanjanja iot afigf online
 
ISACA’s World Congress Insights 2011
ISACA’s World Congress Insights 2011 ISACA’s World Congress Insights 2011
ISACA’s World Congress Insights 2011
 
It conference in brazil
It conference in brazilIt conference in brazil
It conference in brazil
 
Navigating Career Choices in InfoSec - BSides Detroit 2017
Navigating Career Choices in InfoSec - BSides Detroit 2017Navigating Career Choices in InfoSec - BSides Detroit 2017
Navigating Career Choices in InfoSec - BSides Detroit 2017
 
Understanding Blockchain and Its Business Benefits
Understanding Blockchain and Its Business BenefitsUnderstanding Blockchain and Its Business Benefits
Understanding Blockchain and Its Business Benefits
 

Similaire à MCGlobalTech Capability Statement

MCGlobalTech_Commercial_statement
MCGlobalTech_Commercial_statementMCGlobalTech_Commercial_statement
MCGlobalTech_Commercial_statementEugene Dorns
 
MCG_OnePageBrochure
MCG_OnePageBrochureMCG_OnePageBrochure
MCG_OnePageBrochureEugene Dorns
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementWilliam McBorrough
 
nTech Capability Statement
nTech Capability StatementnTech Capability Statement
nTech Capability StatementAllie Sapienza
 
nTech Capability Statement
nTech Capability StatementnTech Capability Statement
nTech Capability StatementAllie Sapienza
 
nTech Capability Statement
nTech Capability StatementnTech Capability Statement
nTech Capability StatementAllie Sapienza
 
iRisk Placement - Corporate Brochure
iRisk Placement - Corporate BrochureiRisk Placement - Corporate Brochure
iRisk Placement - Corporate Brochureirisk4
 
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MDCyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MDClearedJobs.Net
 
CyberTexas Job Fair August 20, 2019 San Antonio
CyberTexas Job Fair August 20, 2019 San AntonioCyberTexas Job Fair August 20, 2019 San Antonio
CyberTexas Job Fair August 20, 2019 San AntonioClearedJobs.Net
 
Cyber or Cleared Job Fair Job Seeker Handbook Feb 13, 2020 San Antonio
Cyber or Cleared Job Fair Job Seeker Handbook Feb 13, 2020 San AntonioCyber or Cleared Job Fair Job Seeker Handbook Feb 13, 2020 San Antonio
Cyber or Cleared Job Fair Job Seeker Handbook Feb 13, 2020 San AntonioClearedJobs.Net
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service ProposalCarl Bradley Pate
 
RS_corporate_ovrvw_Revise60816_ƒemail
RS_corporate_ovrvw_Revise60816_ƒemailRS_corporate_ovrvw_Revise60816_ƒemail
RS_corporate_ovrvw_Revise60816_ƒemailJoe Zuramski
 
Best cybersecurity services for organizations
Best cybersecurity services for organizationsBest cybersecurity services for organizations
Best cybersecurity services for organizationswilsonconsulting1
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System SecurityCSSRL PUNE
 
Technology Executive Search Firm in UK - Leathwaite.pdf
Technology Executive Search Firm in UK - Leathwaite.pdfTechnology Executive Search Firm in UK - Leathwaite.pdf
Technology Executive Search Firm in UK - Leathwaite.pdfonline Marketing
 

Similaire à MCGlobalTech Capability Statement (20)

MCGlobalTech_Commercial_statement
MCGlobalTech_Commercial_statementMCGlobalTech_Commercial_statement
MCGlobalTech_Commercial_statement
 
MCG_OnePageBrochure
MCG_OnePageBrochureMCG_OnePageBrochure
MCG_OnePageBrochure
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
 
nTech Capability Statement
nTech Capability StatementnTech Capability Statement
nTech Capability Statement
 
nTech Capability Statement
nTech Capability StatementnTech Capability Statement
nTech Capability Statement
 
nTech Capability Statement
nTech Capability StatementnTech Capability Statement
nTech Capability Statement
 
The 10 best performing managed security service providers 2018
The 10 best performing managed security service providers 2018The 10 best performing managed security service providers 2018
The 10 best performing managed security service providers 2018
 
iRisk Placement - Corporate Brochure
iRisk Placement - Corporate BrochureiRisk Placement - Corporate Brochure
iRisk Placement - Corporate Brochure
 
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MDCyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
Cyber Job Fair Job Seeker Handbook Oct 29, 2014, Baltimore, MD
 
CyberTexas Job Fair August 20, 2019 San Antonio
CyberTexas Job Fair August 20, 2019 San AntonioCyberTexas Job Fair August 20, 2019 San Antonio
CyberTexas Job Fair August 20, 2019 San Antonio
 
True Services Portfolio Overview
True Services Portfolio OverviewTrue Services Portfolio Overview
True Services Portfolio Overview
 
Cyber or Cleared Job Fair Job Seeker Handbook Feb 13, 2020 San Antonio
Cyber or Cleared Job Fair Job Seeker Handbook Feb 13, 2020 San AntonioCyber or Cleared Job Fair Job Seeker Handbook Feb 13, 2020 San Antonio
Cyber or Cleared Job Fair Job Seeker Handbook Feb 13, 2020 San Antonio
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal
 
Belinda
BelindaBelinda
Belinda
 
RS_corporate_ovrvw_Revise60816_ƒemail
RS_corporate_ovrvw_Revise60816_ƒemailRS_corporate_ovrvw_Revise60816_ƒemail
RS_corporate_ovrvw_Revise60816_ƒemail
 
Best cybersecurity services for organizations
Best cybersecurity services for organizationsBest cybersecurity services for organizations
Best cybersecurity services for organizations
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System Security
 
Technology Executive Search Firm in UK - Leathwaite.pdf
Technology Executive Search Firm in UK - Leathwaite.pdfTechnology Executive Search Firm in UK - Leathwaite.pdf
Technology Executive Search Firm in UK - Leathwaite.pdf
 

Plus de William McBorrough

MCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance ServiceMCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance ServiceWilliam McBorrough
 
MCGlobalTech Managed Security Compliance Program
MCGlobalTech Managed Security Compliance ProgramMCGlobalTech Managed Security Compliance Program
MCGlobalTech Managed Security Compliance ProgramWilliam McBorrough
 
MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement William McBorrough
 
Cybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberCybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberWilliam McBorrough
 
Improving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity FrameworkImproving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity FrameworkWilliam McBorrough
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementWilliam McBorrough
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementWilliam McBorrough
 
MCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management ProgramMCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management ProgramWilliam McBorrough
 
MCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalMCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalWilliam McBorrough
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkWilliam McBorrough
 
Managing Security Risks in Manufacturing
Managing Security Risks in ManufacturingManaging Security Risks in Manufacturing
Managing Security Risks in ManufacturingWilliam McBorrough
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryWilliam McBorrough
 
Protecting Customer Confidential Information
Protecting Customer Confidential InformationProtecting Customer Confidential Information
Protecting Customer Confidential InformationWilliam McBorrough
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseWilliam McBorrough
 
FCC Report on Google Street View Wi-Fi Data Snooping
FCC Report on Google Street View Wi-Fi Data SnoopingFCC Report on Google Street View Wi-Fi Data Snooping
FCC Report on Google Street View Wi-Fi Data SnoopingWilliam McBorrough
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
 

Plus de William McBorrough (18)

MCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance ServiceMCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance Service
 
MCGlobalTech Managed Security Compliance Program
MCGlobalTech Managed Security Compliance ProgramMCGlobalTech Managed Security Compliance Program
MCGlobalTech Managed Security Compliance Program
 
MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement
 
Cybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberCybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen Cyber
 
Improving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity FrameworkImproving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity Framework
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
MCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management ProgramMCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management Program
 
MCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalMCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_Final
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management Framework
 
Managing Security Risks in Manufacturing
Managing Security Risks in ManufacturingManaging Security Risks in Manufacturing
Managing Security Risks in Manufacturing
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
Protecting Customer Confidential Information
Protecting Customer Confidential InformationProtecting Customer Confidential Information
Protecting Customer Confidential Information
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law Please
 
FCC Report on Google Street View Wi-Fi Data Snooping
FCC Report on Google Street View Wi-Fi Data SnoopingFCC Report on Google Street View Wi-Fi Data Snooping
FCC Report on Google Street View Wi-Fi Data Snooping
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 

Dernier

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 

Dernier (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

MCGlobalTech Capability Statement

  • 1. BUSINESS SUMMARY: Mission Critical Global Technology Group (“MCGlobalTech”) is a minority owned, small business founded by industry leaders to provide strategic advisory and consulting services to public and private sector business managers to better align technology and security programs with organizational mission and business goals. EXPERTISE SUMMARY: Our staff is composed of technical subject matter experts and management level personnel. All management level consultants have over 20+ years experience in Information Security and IT Infrastructure management. All management and technical staff hold industry recognized certifications including CISSP, CISA, CRISC, CEH, PMP, CCSK, CBCP, and ITIL. Our experts combine many decades of experience in industries such as Finance, Healthcare, Manufacturing, Insurance, Education, and Federal and State Government agencies. CORE CAPABILITIES: • Enterprise Information Security Management Services • IT Infrastructure Management Services • IT Governance, Risk, and Compliance Services • IT / Security Program Management Services • Cloud Computing Security and Migration Services SERVICE DELIVERY MODEL: WWW.MCGLOBALTECH.COM Contact Info MCGlobalTech 1776 I Street, NW 9th Floor Washington, DC. 20006 (p) 571-249-3932 (e) info@mcglobaltech.com (w) www.mcglobaltech.com NAICS Codes: 518210, 541512, 541512, 541513, 541519 Cage Code: 76X97 DUNS #: 967264701 CUSTOMERS: Provided Information Security and Compliance Subject Matter Expertise services Provided Executive Level Consulting Services in IT Infrastructure Management and Cloud Computing Migration Provided Executive level Information Security Program and Risk Management services. Provided Executive Information Security advisory services.