top of page


Deceptive Defense, Inc. is an industry leading cyber security company focused on helping organizations reduce business risk by leveraging cyber-deception solutions as part of their respective IT security programs.

The company is a privately held organization based in the United States.  We provide a complimentary portfolio of cyber security services and solutions to public and privately-owned companies across many regulated industries as well as Federal, State, and Municipal governments across the globe.


The companies tagline "Take Back The Advantage" highlights in part one of our goals which is to debunk the perception that "Defenders need to be right 100% of the time while the bad guys only need to be right once."  That is simply not the case when cyber deception is employed appropriately!


We engage one of less than 200 people who have achieved the security industry’s premier practical certification, the GIAC Security Expert, one of less than 20 people certified by SANS as a Cyber Guardian for both red and blue teams and one of less than 150 SANS Certified Instructors.


Our consultants achieve and maintain some of the security industry’s most recognized certifications including:

· GIAC Security Expert

· Certified Information Systems Auditor

· GIAC Certified Windows Security


· GIAC Certified Enterprise Defender

· GIAC Mobile Device Security Analyst

· GIAC Auditing Wireless Networks


· GIAC Certified Incident Handler

· GIAC Reverse Engineering Malware

· GIAC Certified Penetration Tester

· GIAC Certified Intrusion Analyst

· GIAC Certified Forensic Analyst

· GIAC Perimeter Protection Analyst

· GIAC Certified Security Consultant

· Snort Certified Professional

· GIAC Security Essentials Certification

SANS logo.png
GIAC logo.jpg


Our consultants also work to pass on security knowledge to the community via involvement with SANS by teaching:

SEC550 – Cyber Deception - Attack Detection, Disruption and Active Defense

SEC580 – Metasploit Kung Fu for Enterprise Pen Testing

SEC561 – Intense Hands-on Pen Testing Skill Development

SEC560 – Network Penetration Testing and Ethical Hacking

SEC504 – Hacker Techniques, Exploits and Incident Handling

SEC503 – Intrusion Detection In-Depth

Things you can count on from us


Our experiences have taught us that different organizations have different cultures, risk tolerance levels, and varied abilities to effectively and securely drive business with the assistance of technology.


Our expertise enables us to quickly identify where an organizations cyber security maturity level is and then determine how to continuously and effectively manage related business risk in a proactive, cost-effective, and business focused manner.


We know it’s a team effort!  Our professionals have experience engaging audiences ranging from the Board Room to the technologists who are tasked  with the daily operations of technology.  This results in our deliverable's being relevant and actionable!

bottom of page