Contact Us

(678) 235-9076

Follow Us:

Advisory Board

Myrna M. White,

IAP

Myrna White is a nationally recognized expert with 25+ years of impactful leadership in government and community relations and communications, leveraging her expansive network of government officials on local, state and congressional levels. Her accomplishments reflect proficiency in outreach, project management, stakeholder engagement, editorial/quality control, and event planning. Hired to win governmental approval to build ATL's fifth runway, White's impressive success with that project forecast a distinguished career at the world's busiest airport. She is a highly effective communicator with a proven record of building high performance teams and delivering programs with excellence. Recognized by business and community leaders and elected officials throughout the region as fair, transparent and responsive, she has been commended for outstanding leadership with resolutions from both the State Senate and the House of Representatives. Her exceptional interpersonal skills were highlighted while providing community and stakeholder engagement training in Shanghai, Taiwan, Kenya and other international locales.

Advisory Board

Sam Aiello,

Ph. D. Cybersecurity

Dr. Samuel Aiello is a distinguished cybersecurity expert with over two decades of experience designing and implementing enterprise security solutions. As Principal Security Solution Architect at Verizon Business Group, he served as Technical Design Authority across multiple vertical markets. He holds a Ph.D. in Cyber Defense from Dakota State University, along with master's degrees in Information Assurance, Cyber Defense, and Business Administration. Dr. Aiello's expertise spans Zero Trust Network Access (ZTNA), 5G/6G, Artificial Intelligence, and advanced security architectures. He holds elite industry certifications including CISSP, CISA, and CCSK, along with specialized credentials from AWS, Zscaler, Cisco, and Palo Alto Networks.

His experience includes leading complex security initiatives for global enterprises while collaborating with C-suite executives to align security strategies with business objectives. He is recognized for translating complex technical concepts into actionable business solutions, with particular expertise in regulatory compliance frameworks including NIST, ISO 27000, and HIPAA.

Advisory Board

Michelle Austin,

MBA, ICP-ACC, PSM II, CCSK,

ICP-ATF, ITIL, TKP, CSPO,

PSM, CSM, ICP, AWS

Michelle is an adjunct professor, teaching CIS 112: Introduction to Cloud Computing, CIS 373: Web Architecture Design and Development, and Al Prompting. She’s also a seasoned Ethical Hacker & Fraud detection liason. Michelle brings over 10 years of professional experience in cybersecurity, compliance, and risk management. With an MBA and hands-on expertise in frameworks like HIPPA, FFIEC, CIS v 8.1, SOX, SOC 1- 3, and cybersecurity standards such as NIST and CIS Controls, she specializes in aligning security strategies with business objectives. I’ve also worked extensively with AWS Identity and Access Management (IAM), helping organizations build secure, scalable cloud environments. Her focus is on ensuring robust compliance while optimizing operational efficiency, enabling businesses to stay ahead in an increasingly regulated and digital-first world. She’s passionate about creating secure frameworks that not only meet industry standards but also drive long-term value.

Advisory Board

Jennifer Raiford,

LSSBB, CISO, DCISO, HBISO, GPO,

Multi National Award Winning Technology Leader

Jennifer Raiford is a forward-thinking, multi award-winning cybersecurity leader with over 2 decades of transformative success across Fortune 500 companies, government entities, and global organizations. Recognized for her expertise in cybersecurity, responsible AI, governance, privacy, and compliance, Jennifer has continually implemented innovative strategies that drive profitability, mitigate risks, and ensure operational excellence. 

As a dynamic and visionary leader, Jennifer has operationalized cybersecurity frameworks across diverse industries, integrating advanced AI technologies to enhance data privacy, risk management, and network security. She founded the Security, Privacy, Compliance, and Risk Office for InComm the world’s largest prepaid processor, becoming its inaugural CISO, CCRO, and CPO. At Unisys, Jennifer spearheaded data center as a service, cloud as a service, network and infrastructure as a service migrations and transitions as a Security Consulting Executive.  Jennifer became the company’s first Business Infrastructure Security Officer (BISO) in 2022, advanced to Deputy CISO and Head BISO, and was later appointed as the CEO’s Whitehouse liaison to the President’s National Security Telecommunications Advisory Committee (NSTAC). As a member of two NSTAC subcommittees, she is contributed to national cybersecurity strategies that shaped key recommendations to the President in 2023 & 2024. 

 

Jennifer’s technical expertise spans NIST cybersecurity frameworks, Incident Response and Crisis Management, AI integration, compliance, and risk mitigation. With a flawless track record in achieving framework certifications, she excels in aligning emerging technologies with operational security objectives. Her commitment to fostering diversity and inclusion is exemplified by her role as DEI Executive Board Chair for Unisys’ Global Diversity, Associate Impact Group (AIG), where she champions underrepresented voices across industries and geographies. 

 

Jennifer Raiford is also a highly regarded keynote speaker, celebrated for her compelling presentations on promoting responsible AI. She emphasizes the critical importance of ethical AI practices, advocating for transparency, fairness, and accountability in AI systems. Through her speeches, she highlights the potential of responsible AI to drive innovation while safeguarding societal values. Jennifer’s powerful insights continue to inspire organizations to adopt inclusive and ethical approaches, ensuring a better future shaped by AI.

 

Her exceptional contributions have earned her numerous accolades, including the Unisys Annual Achievement Award, the Diversity Equity and Inclusion Creative Innovator Award, and the National Leadership in Action Award. Jennifer has also made significant impacts in leadership roles with prominent organizations such as Kellogg’s, Grant Thornton, Ford Motor Company, PricewaterhouseCoopers, and the American Red Cross.

Advisory Board

Team

Marcus Crockett,

Founder and CEO

Marcus has 25+ years of experience in finance/accounting roles in professional sports, high-tech startup, service startup and non-profit. His team has over 100 years of networking, IT, data and staffing experience that has solved some of the most difficult technical problems. Prior to this role, he was the Accounting Manager for Dispersive Networks, Inc. a high-tech networking startup that raised $90M+ over 5 years. He was the lead accountant during 3 external audits that led to several funding extensions. He also managed the $200M player, coaching, scouting and stadium operations payroll for the 1995 World Champion Atlanta Braves Baseball Club from 1993-1996.

Founder and CEO

Harris Nussbaum,

VP, Chief Architect

Harris is a seasoned senior executive with over 25 years of experience leading multi-functional teams in cybersecurity, software development, system design, and emerging technologies across both government and commercial sectors. With a background in the US Marine Corps as a Cryptologist, Harris brings a disciplined, strategic approach to every project, particularly in high-stakes, security-sensitive environments. His extensive knowledge of cloud architectures, AI/ML technologies, and Zero Trust principles makes him a forward-thinking leader in the cybersecurity and technology fields.

VP, Chief Architect

Gregory Turk,

VP, Technology and Cybersecurity

Greg has 30+ years of experience in the support of multi-platform critical enterprise level IT infrastructure for TSA and AOC. He has an extensive background in IT Service Management: Program Management, Service Planning, Service Design, and Service Operations. Specific service delivery innovation in the areas of Cybersecurity, System Engineering, Enterprise Architecture, DevOps and Operations in the federal space. Management experience is bolstered by a Computer Science background and an advanced degree in Information Systems.

VP, Technology and Cybersecurity

Frequently Asked Questions

Q:

Isn't it safer to select the biggest brand?

The adage is that you don't get fired for hiring the big brands. This may be true initially but the big brands are being hacked incessantly, so this approach is flawed. Big brands are big because they spend the most on advertising and have a history of success. When implementing new technology, the playing field is relatively level, with new companies entering the market daily. Sometimes we do select the large brands, other times we select the best technology that will become a large brand tomorrow. We have seen customers select the biggest brand, only to find out later that they did not have the required technology in-house.

Q:

How do I know if I am really protected?

We provide a cyber risk analysis scan before and after which correlates to the the NIST-800-53 framework and the entire Mitre attack framework, all 4,700 endpoints mapped directly to their endpoints. It is a subscription so you can continue to run it as frequently as needed, risks will show up on your dashboard. Not only does this show you what you need to fix, it will help you retain cyber insurance and reduce your premium.

Q:

Can you prove that man-in-the-middle is a threat?

I can't show you the wind but I can prove that the wind is there because of it's impact on our environment. In the same way, we read every week about cyber attacks, ransomeware and data breaches, each one more severe than the prior one. The adversaries are breaching the network, the evidence is there. This is why we begin our remediation by upgrading to a true SASE Network with Zero Trust Networking features.

Q:

If I use the tools that everyone else uses, does that make me safer?

The answer is 'Maybe'. Contrary to this line of thinking, using the big brand tools could make you more of a target because the adversaries know the make and model of the safe that they are trying to crack. For example, PCs were the favorite target for viruses because they represented 95% of the market and Macs only 5% in the 1990's. As Macs have risen to 17% of operating systems today, viruses are now being written to target them, as they are a wide enough target to be worth the effort. We do not advertise all of our tools because we want to keep the adversary guessing. If the breach is too challenging they will look for a more vulnerable target to be their next victim.

Q:

Elaborate on the Multi-path encryption orchestration and endpoint security across rotating endpoints.

NetFoundry’s Zero Trust Network-as-a-Service (ZTNaaS) architecture leverages dynamic, multipath encryption with continuous endpoint validation. Multipath means application sessions can be routed across separate, ephemeral paths— with each E2E service, as well as hop by hop connection, independently encrypted with unique keys—to minimize risk if any one path is compromised.

Endpoints authenticate using strong, cryptographic identity (e.g., mutual TLS with identity certificates) and undergo continuous posture checks. This ensures session initiation and maintenance are only allowed from trusted, compliant endpoints. All encryption and path logic is orchestrated by the fabric, using PKI, but enforced at the edge, minimizing centralized attack surfaces.

Q:

Please discuss Quantum-readiness and alignment with Nist PQC standards.

Yes, NetFoundry is actively tracking and preparing to align with NIST’s Post-Quantum Cryptography (PQC) standards. We’ve begun early-stage testing of hybrid cryptographic models (classical + post-quantum) using the NIST finalists such as CRYSTALS-Kyber and Dilithium.

Our modular crypto framework allows us to adopt new primitives without redesigning the entire fabric, and we’re targeting early adoption once NIST finalizes its recommendations.


Q:

Is there sandbox or proof-of-concept (PoC) environment availability?

Absolutely. We offer a sandbox environment designed for rapid testing and exploration of our platform capabilities. It’s a great way to validate application performance, security posture, and integration strategies in a low-risk environment.

If you're considering a pilot, we’d be happy to assist in tailoring a lightweight PoC that aligns with your infrastructure, use case, and compliance priorities. Just let us know your ideal scope and any technical constraints, and we’ll help design something practical and measurable.

Q:

Any plans for third-party validation and compliance frameworks?

Yes, NetFoundry is actively maintains alignment with leading frameworks including ISO 27001, SOC 2 Type II, and is exploring how to meet FedRAMP compliance. We also get the platform and technology pen tested yearly.


Follow Us

Follow Us

Cyberswitch Technologies is a cybersecurity firm specializing in data security, networking, cloud architecture, cloud storage, mobile apps and staffing.

Contact Us

  • (678) 235-9076

  • 3343 Peachtree Rd, NE Ste 180-1348

  • Atlanta

  • GA

  • Monday - Friday, 8:00 am - 5:00 pm

© Copyright 2025. Cyberswitch Technologies, LLC. All rights reserved.