Cybersecurity Strategy for Utility Operations Teams: Building a Defense That Works
Every day, utility operations teams keep the lights on, water flowing, and gas moving through pipelines.
Learn More
Location: Eugene
Services: Application and API Assessment, Cybersecurity Risk Assessments, Incident Readiness, Penetration Testing Services, Red Team Services
Industries: Blockchain & Digital Assets, Financial Services, Nonprofit
Josh started his career building IT systems in 2009 and has nearly a decade of experience working directly with clients on IT security and compliance challenges. Today, he continues this important work by leading BPM’s cutting-edge Cybersecurity Assessment Services team that provides in-depth, rigorous security assessments for organizations of all sizes and industries.
By emulating threat actors through technical TTPs (techniques, tactics, procedures) and social engineering, Josh and his team of IT security professionals provide clients with the insight required to defend their networks and applications against the latest cybersecurity threats.
Leveraging his offensive experience and formal incident response/digital forensic training, he leads a team that assists clients during active cybersecurity breaches and provides forensic support after the fact to review network breaches, email compromise, malicious insiders and digital evidence in forensic accounting cases.
Josh has expertise in cybersecurity assessment, adversarial threat assessment, and digital forensics and incident response. He has personally conducted over 250 client engagements during his career and is a frequent presenter at industry conferences.
Josh applies his technical background to tangible hobbies and rebuilds everything from compression ignition engines to houses.
Computer Information Science – University of Oregon
Every day, utility operations teams keep the lights on, water flowing, and gas moving through pipelines.
Learn More
Penetration testing for electric utility critical infrastructure helps identify vulnerabilities in IT and OT systems, ensuring compliance and stronger cyber defenses.
Learn More
While often used interchangeably, business continuity and disaster recovery serve distinct roles in your organization’s preparedness strategy. Learn how each framework supports your ability to maintain operations, restore systems, and minimize disruption when incidents strike.
Learn More