Cyber Security

[av_slideshow_full size=’no scaling’ stretch=” animation=’fade’ autoplay=’true’ interval=’6′ control_layout=’av-control-minimal’ perma_caption=’aviaTBperma_caption’ src=’https://footbridgeconsulting.com/wp-content/uploads/2017/02/Logomakr_4XC1Ed-300×84.png’ attachment=’97’ attachment_size=’medium’ position=’top left’ repeat=’no-repeat’ attach=’scroll’]
[av_slide_full slide_type=’image’ id=’1008′ video=’http://’ mobile_image=” video_format=” video_ratio=’16:9′ title=” custom_title_size=’40’ custom_content_size=’32’ caption_pos=’caption_center’ link_apply=” link=’lightbox’ link_target=” button_label=’Learn More’ button_color=’theme-color’ link1=’page,91′ link_target1=” button_label2=’Locations’ button_color2=’theme-color-subtle’ link2=’page,131′ link_target2=” font_color=” custom_title=’#222222′ custom_content=’#4c4c4c’ overlay_enable=’aviaTBaviaTBoverlay_enable’ overlay_opacity=’0.5′ overlay_color=’#000000′ overlay_pattern=” overlay_custom_pattern=”]
Cyber, Information, and Application Security
[/av_slide_full]
[/av_slideshow_full]

[av_one_full first min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=”]

[av_codeblock wrapper_element=” wrapper_element_attributes=”]

[/av_codeblock]

[av_textblock size=” font_color=” color=”]


Our team has significant experience in both cyber and application security initiatives in both the commercial and the government sectors. As an active and cleared government contractor, we began our experience supporting cyber security initiatives in 2009 within the federal government, and have since moved to the application security space as well as working with commercial clients.

[/av_textblock]

[av_button label=’More’ link=’page,600′ link_target=” size=’small’ position=’center’ icon_select=’no’ icon=’ue800′ font=’entypo-fontello’ color=’light’ custom_bg=’#444444′ custom_font=’#ffffff’]

[/av_one_full][av_icon_box position=’left_content’ boxed=” icon=’ue824′ font=’entypo-fontello’ title=’OWASP Project’ link=” linktarget=” linkelement=” font_color=” custom_title=” custom_content=” color=’custom’ custom_bg=” custom_font=” custom_border=”]
OWASP Java Project: Supported an enterprise level OWASP
implementation in a Java environment while adhering to
OWASP, LDAP, and identity management standards.
Project Size: 4 Java OWASP Developers
[/av_icon_box]

[av_icon_box position=’left_content’ boxed=” icon=’ue8d7′ font=’entypo-fontello’ title=’Identity Management ‘ link=” linktarget=” linkelement=” font_color=” custom_title=” custom_content=” color=’custom’ custom_bg=” custom_font=” custom_border=”]
Identity and Access Management: Supported a large Boston based
Banking clients in staffing multiple Identity and Access Management PM’s
Project Size: 3 IDM Project Managers
[/av_icon_box]

[av_promobox button=’yes’ label=’Download Now’ link=’manually,https://footbridgeconsulting.com/wp-content/uploads/2017/11/FootBridge-Final.pdf’ link_target=’_blank’ color=’theme-color’ custom_bg=’#444444′ custom_font=’#ffffff’ size=’medium’ icon_select=’yes’ icon=’ue82d’ font=’entypo-fontello’ box_color=” box_custom_font=’#ffffff’ box_custom_bg=’#444444′ box_custom_border=’#333333′]
Financial Services Quick Guide     Looking for more information? Download our FootBridge Services Guide to learn more about the solutions we offer.
[/av_promobox]

[av_hr class=’default’ height=’50’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ font=’entypo-fontello’]