InfoSec &
Compliance SolutionsWe do the heavy lifting, so you
can get back to YOUR business.

Request a free quote
Information Security

We provide strong information security consulting and compliance services for any business, Gov't or Commercial.

Compliance Consulting

Compliance Necessities. From GDPR to HIPAA-HIGHTRUST and in between..All topics your business needs to drive security. From qualified, battle tested, professionals!

Audit Validation

We are your virtual compliance department or VCCO/VCISO. Your audit is important to us. We will privide the interface, on your behalf, with your auditors.

Red Lion Learning

(In-Progress)
Affordable training for the Information Security Professional by the Information Security Professional.

About Us

WHY CHOOSE RED LION

Description

Red Lion is a topshelf Information Security consulting firm with unprecedented access to the highest caliber hackers the industry has too offer.

With a combined 45 years of experience in the industry, Red Lion staff are regular speakers on the conference circuit and have unprecedented access to the best security professionals the industry has to offer.

From basic vulnerability scans to compliance validation to full scope enterprise architecture and security design, we have the right solution to complete your project ON-TIME and ON-BUDGET.

Typical Client Services Requested:

Information Security & Hacking

90%

Compliance & Audits

95%

Penetration Testing & Exploits

90%

Breach Data

85%

Managed Security Services

92%

Security Learning

98%

Are these a problem:

LETUS HELP YOU

What we do

THE SERVICES WE PROVIDE

Security Consulting

Enterprise Architecture Design and Implementation
Gap Analysis
Security Systems Development
Security Training
Hacker Resources Used

Learn more
Gap Analysis

NIST800-53, ISO27001/2, EUPS, 800-171, BCP / COOP
Vulnerability & Penetration Testing
DIACAP/FISMA/RMF(C&A)
SOX, PCI, HIPAA, FFIEC, GLBA
Virtual CISO (V-CISO)

Learn more
Audit Liason

Take the stress out of audits
Red Lion acts as interface
Providing team buffers
Understanding of business
Cost Savings Methodologies
Red Lion can bring in the auditors

Learn more
Red Lion Learning

Training from Industry Experts
Agreeable Rates
Easy to Understand Format
Taught by Information Security Professionals
Content to Advance Your Career

Learn more
Remediation Planning

Automated Service
Regular Network to ICS/SCADA
Mitigation Services
Critical Infrastructure Protection
Easy to Decipher Reporting
Focus: Depth over Breadth

Learn more
Virtual Compliance officer (VCO)

Risk, Threat, Vulnerability Mapping
Asset Inventory
Security and Compliance level set
Tabletop and On-site Exercises
Multinational Modeling & Mitigation
Stakeholders Executive Reporting

Learn more
Compliance Coaching

Privileged Access Management
Granular Access Control
User Attestation to Systems
Automated Provisioning
Federation Extensioning
Easy Credential Reset

Learn more
Policies/Standards Development

90,000 Foot view
Stakeholder Involvement
Fits Current Business Process
Satisfy Compliance Requirements
Influence Protection to Employees
Reduce Risk to the Business

Learn more

Interested?

If you are interested, then feel free to contact us.

Contact Now

Testimonial

SEE WHAT OUR CLIENTS SAYS

Our Team

Scott Lyons
Scott Lyons

Scott Lyons is a technical visionary who brings ideas and advanced concepts to fruition through costeffective solutions that improve profitability.

His skills include sales, negotiation tactics, and complex international projects and project management. His security practitioner background includes classified work for various federal agencies, addressing risk and mitigating actions in the private sector, as well as mitigating attacks of all shapes and sizes across the board.

Scott is a solid natural born leader with great vision and talent sets.

Joshua Marpet
Joshua Marpet

Joshua Marpet is an accomplished speaker, long time information and physical security practitioner, as well as a start up CEO and serial entrepreneur.

He has presented on topics ranging from Facial Recognition to National Security, to audiences from government agencies, law enforcement, Fortune 5 companies, and many others. His research encompasses Digital Forensics, business security maturity, and how not to start an information security business!

His conference is Security BSides Delaware. Josh is also a super connector.

Contact

For any question or quotes, please feel free to contact us:

2207 Concord Pike #117
Wilmington, DE 19803

202.559.9365

Send a quick message