A Veteran-Owned, Minority-Owned, SBA (8a) Small Business
TRUE INFORMATION ASSURANCE, LLC. (TRUE) provides U.S. Federal agencies and commercial entities proven, low-risk cyber, security and management solutions. We were founded in 2007 and are a federally registered, veteran-owned, minority-owned, Small Business Administration (SBA)-approved 8(a) disadvantaged business. We have strong federal government experience delivering innovative enterprise-wide cyber and security solution programs and staff. Our highly skilled workforce of experts assists customers in meeting the requirements of a dynamic security landscape by addressing today’s challenges and providing the capability to secure, build, modernize, and sustain complex mission environments. Our services incorporate strong program management plans; workforce engagement and retention strategies; innovative security engineering approaches; and risk management focus to ensure a high level of operations in support of your mission.
We are results based organization focused on providing solutions from a comprehensive and robust program perspective. Our exceptional record of implementing efficient and effective cyber and security programs grants assurance to our clients that our team will provide certified, highly skilled, subject matter experts committed to support their security needs.
At TRUE, we are committed to providing world-class service. Whether Civil, Defense, or National Security, our portfolio of services enables your mission by protecting your organization’s most valuable assets:
TRUE employs full time professionals who hold industry recognized Cyber and Personnel Security certifications such as the Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Electronic Commerce (EC) Council Certified Ethical Hacker (C|EH), CompTIA Advanced Security Practitioner (CASP), and Security Fundamentals Professional Certification (SFPC) to name a few. True has been operationally architected to meet all aspects of our customers’ personnel, physical, and Cybersecurity needs.
C. Adam Gold II
Mr. C. Adam Gold II, Esq provides leadership for True IA in the areas of Legal/Ethics, Contract Management and Corporate Governance. He is a member of True IA’s Executive Management team and participates in the operational management and strategic planning of the company.
Realizing the Need
The September 11th terrorist attack on the United States, the Federal Information Security Management Act (FISMA) enactment, critical infrastructure outages, devastating virus/worm attacks etc., have really brought information assurance (e.g., now cybersecurity) to the forefront of the Government, corporate executives and other decision makers. In an attempt to addressing these concerns, I established True Information Assurance, LLC (True IA).
I have often discovered that key aspects of information assurance are missing from organizational security programs. The necessity for a complete and comprehensive security architecture propelled me to create an enterprise (e.g., True IA) that had the capability to develop and sustainable security environments. Based on my experience, in the Pentagon and other Department of Defense (DoD) agencies, and practical application/engineering, I believe there are key and correlative components that every information technology environment needs to possess to sustain and secure their network operations.
Network security management ought to be designed to protect the vital assets of the business and be able to achieve return-on-investment. The correlation between business management and security management is not prevalent. True IA is designed to bridge this gap, and service all the cybersecurity needs of our clients; demystifying cybersecurity because organization need to know the unknowns, regarding cyber in this Information Age.
–Steven Covey, Founder and CEO
Meaning of a Logo
Our logo is symbolic of a Hurricane. First, draw your attention to the 3 water drops that comprise the main body of the Hurricane. These 3 drops are representative of the 3 components of Information Assurance (IA), known as the Triad of IA: Confidentiality, Integrity, and Availability.
Second, note that the water drops appear to be rotating in a clockwise fashion. In the natural, and in the northern hemisphere, Hurricanes rotate counter clockwise. Also, in the natural, we know that Hurricanes are considered destructive forces. So, we designed our Hurricane to rotate clockwise because True is constructive or reconstructive force.
Third, no Hurricane would be complete without an Eye of the Storm. What is relatively known about the Eye is the calm, but what is relatively unknown is that the Eye is the influence that keeps the storm together. Without the Eye, the storm will collapse on itself, and cease to exist. As an analogy, we believe that Information Technology (IT) can be observed as an electronic storm, where there is a collision on 1’s and 0’s. Fortunately, IT has protocols in place to cause order in the storm. The Eye at the center of the IT storm is where IA sits. IA brings order (e.g., confidentiality, integrity, and availability) to IT, and without this influence the storm would collapse on itself.
Lastly, notice the concentric rings under the Hurricane. These rings are symbolic of the impact that True has on every environment that we provide service to. Our impact starts at the center of an organization and reverberates to its outer fringes; by doing so we provide what IT needs . . . True IA