About Us

Cyber;Security;Management Consulting

A Veteran-Owned, Minority-Owned, SBA (8a) Small Business

TRUE INFORMATION ASSURANCE, LLC. (TRUE) provides U.S. Federal agencies and commercial entities proven, low-risk cyber, security and management solutions. We were founded in 2007 and are a federally registered, veteran-owned, minority-owned, Small Business Administration (SBA)-approved 8(a) disadvantaged business.  We have strong federal government experience delivering innovative enterprise-wide cyber and security solution programs and staff. Our highly skilled workforce of experts assists customers in meeting the requirements of a dynamic security landscape by addressing today’s challenges and providing the capability to secure, build, modernize, and sustain complex mission environments. Our services incorporate strong program management plans; workforce engagement and retention strategies; innovative security engineering approaches; and risk management focus to ensure a high level of operations in support of your mission.

We are results based organization focused on providing solutions from a comprehensive and robust program perspective. Our exceptional record of implementing efficient and effective cyber and security programs grants assurance to our clients that our team will provide certified, highly skilled, subject matter experts committed to support their security needs.

At TRUE, we are committed to providing world-class service. Whether Civil, Defense, or National Security, our portfolio of services enables your mission by protecting your organization’s most valuable assets:

Our Leadership

TRUE employs full time professionals who hold industry recognized Cyber and Personnel Security certifications such as the Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Electronic Commerce (EC) Council Certified Ethical Hacker (C|EH), CompTIA Advanced Security Practitioner (CASP), and Security Fundamentals Professional Certification (SFPC) to name a few. True has been operationally architected to meet all aspects of our customers’ personnel, physical, and Cybersecurity needs.

Steven Covey

Founder and CEO

Mr. Covey has more than 24 years of professional knowledge and experience in a variety of telecommunications fields. His expertise ranges from network security to RF engineering.

David Gregory

Senior Vice President, Operations

Mr. Gregory is a Senior Cybersecurity Engineering and Risk Management Professional with over 15 years of experience designing, implementing, analyzing and managing layered security architectures and programs within Federal (Civil & Defense) and Private sector organizations.

Joseph (JJ) Milhorn

Vice President, Enterprise Solutions

Mr. Milhorn is a Senior Solutions Architect and Strategist with over 20 year of the domestic, international and federal telecommunications, broadband, and IT industries.  He leverages a vast background to create innovative and cost effective enterprise solutions across a wide range of technologies and customer enclaves.

C. Adam Gold II

General Counsel

Mr. C. Adam Gold II, Esq provides leadership for True IA in the areas of Legal/Ethics, Contract Management and Corporate Governance. He is a member of True IA’s Executive Management team and participates in the operational management and strategic planning of the company.

Kimberly Campbell

Director, Human Capital Management

As the Director of Human Capital Management, Mrs. Campbell is responsible for the administration and management of programs and personnel.

KaShondra Covey

Human Capital Officer

Ms. KaShondra Covey is the Human Capital Officer for True IA’s Human Capital Management Division, with her primary functions involving the organization, administration, and development of corporate assets

Our Story

Realizing the Need

The September 11th terrorist attack on the United States, the Federal Information Security Management Act (FISMA) enactment, critical infrastructure outages, devastating virus/worm attacks etc., have really brought information assurance (e.g., now cybersecurity) to the forefront of the Government, corporate executives and other decision makers. In an attempt to addressing these concerns, I established True Information Assurance, LLC (True IA).

I have often discovered that key aspects of information assurance are missing from organizational security programs.  The necessity for a complete and comprehensive security architecture propelled me to create an enterprise (e.g., True IA) that had the capability to develop and sustainable security environments.  Based on my experience, in the Pentagon and other Department of Defense (DoD) agencies, and practical application/engineering, I believe there are key and correlative components that every information technology environment needs to possess to sustain and secure their network operations.

Network security management ought to be designed to protect the vital assets of the business and be able to achieve return-on-investment.  The correlation between business management and security management is not prevalent.  True IA is designed to bridge this gap, and service all the cybersecurity needs of our clients; demystifying cybersecurity because organization need to know the unknowns, regarding cyber in this Information Age.

–Steven Covey, Founder and CEO

Meaning of a Logo

Original True LogoOur logo is symbolic of a Hurricane.  First, draw your attention to the 3 water drops that comprise the main body of the Hurricane. These 3 drops are representative of the 3 components of Information Assurance (IA), known as the Triad of IA: Confidentiality, Integrity, and Availability.

Second, note that the water drops appear to be rotating in a clockwise fashion.  In the natural, and in the northern hemisphere, Hurricanes rotate counter clockwise.   Also, in the natural, we know that Hurricanes are considered destructive forces.  So, we designed our Hurricane to rotate clockwise because True is constructive or reconstructive force.

Third, no Hurricane would be complete without an Eye of the Storm.  What is relatively known about the Eye is the calm, but what is relatively unknown is that the Eye is the influence that keeps the storm together.  Without the Eye, the storm will collapse on itself, and cease to exist. As an analogy, we believe that Information Technology (IT) can be observed as an electronic storm, where there is a collision on 1’s and 0’s. Fortunately, IT has protocols in place to cause order in the storm.  The Eye at the center of the IT storm is where IA sits.  IA brings order (e.g., confidentiality, integrity, and availability) to IT, and without this influence the storm would collapse on itself.

Lastly, notice the concentric rings under the Hurricane.  These rings are symbolic of the impact that True has on every environment that we provide service to.  Our impact starts at the center of an organization and reverberates to its outer fringes; by doing so we provide what IT needs . . . True IA