SE_Cyber Security_hero0 SE_Cyber Secutiry_T Hero0 SE_Cyber Security_Hero M0

Cybersecurity

When governance is built in and identity anchors every control, security aligns with business objectives and progress becomes visible to leaders and auditors. Build a posture you can measure, improve, and trust—one that strengthens every day.

Expertise

Security you can run with clarity, discipline, and confidence.

Security is how you turn risk into disciplined, reliable operations. It’s more than deploying tools. It’s unifying identity, strengthening detection and response, protecting endpoints and networks, shaping architecture, aligning compliance, and coaching human behavior. Together, these capabilities create the clarity, governance, and resilience every organization depends on. Explore the full range of our Security expertise below.

Identity & Access Management

Protect your organization from breaches and audit risks by making identity a cornerstone of your security strategy. We design and implement identity and access management programs for cloud and on-premises environments, integrating single sign-on, multi-factor authentication, governance, and privileged access management with your existing systems. Zero trust is built in from the start, and every individual receives the right access through clear roles, structured workflows, and ongoing reviews. Automated lifecycle management keeps your security perimeter strong and adaptable.

Cybersecurity_Expertise 1_Identity@0.75x-8
Cybersecurity_Expertise 2 Security Op@0.75x-8

Security Operations, Threat Detection & Incident Response

Accelerate threat detection and response by transforming your security operations. We build and refine processes that integrate SIEM, XDR, SOAR, and threat intelligence with your existing teams and tools, using MITRE ATT&CK–aligned playbooks. Instead of overwhelming alert storms, you get actionable runbooks, on-call models, tabletop exercises, and automation that connect SOC workflows to ITSM and business stakeholders. Incidents are contained faster, lessons drive real change, and you gain clear metrics for resilience, MTTD, and MTTR.

Endpoint, Network & Cloud Protection

Safeguard endpoints, networks, and cloud workloads without slowing your business. We build layered defenses that combine endpoint detection, next-generation firewalls, secure access service edge, and hardening baselines tailored to real attack paths. Our approach replaces ad hoc exceptions with clear, actionable patterns. We deliver segmented network designs, robust policies, and integrated monitoring, connecting security operations with IT teams. This results is security posture that is visible to leadership and auditors, while also reducing intrusions and strengthening barriers against lateral movement.

Cybersecurity_Expertise 3_Endpoint Network@0.75x-8
Cybersecurity_Expertise 4_Security Archit@0.75x-8

Security Architecture & Risk Management

Reduce cyber risk by designing security architectures that match how your business actually operates. We align NIST RMF, NIST CSF, and zero trust principles with practical patterns for on-prem, cloud, and SaaS workloads. No generic checklists or tool-led diagrams. Engagements yield reference architectures, control mappings, risk registers, decision records, and roadmaps linked to regulatory obligations and tolerance. Leaders gain a defensible risk story, clearer investment priorities, and controls that engineers, auditors, and boards can all understand.

Compliance & Policy Frameworks

Unify your security and privacy compliance frameworks to reduce audit fatigue and regulatory risk. We build a cohesive system tailored to your risk appetite mapping NIST, CIS, HIPAA, CJIS, PCI DSS, and ISO 27001 into a single control library and policy set. Our approach eliminates duplicate effort and replaces “binderware” with clear, actionable policies. Governance works with system owners and security operations to assign control ownership and establish review cycles, resulting in faster audits and greater stakeholder trust.

Cybersecurity_Expertise 5_Compliance@0.75x-8
Cybersecurity_Expertise 6_Human Risk Manag

Human Risk Management & Training

Lower breach risk by transforming employees from security liabilities into coached defenders. Our human risk programs blend phishing simulations with role-based microlearning and just-in-time coaching, all grounded in your policies and regulatory obligations. Instead of relying on annual training videos, deliver targeted content and reporting dashboards that connect HR, security operations, and compliance. This approach shifts the focus from completion rates to measurable behavior change, making progress visible and actionable across your organization.

Our Clients

Hundreds of clients.
Thousands of projects.

Cybersecurity_ETestimonial @0.75x-8 Cybersecurity_ETestimonial T@0.75x-8 Cybersecurity_ETestimonial M@0.75x-8

In the midst of the cyberattack that made international headlines, Resource Data’s professionals helped bring a majority of our affected services securely back online.

~ Eric Wyatt, Former IT Director, Mat-Su Borough, Alaska
177 Chugach Network Redesign@0.75x-8

Electric Utility

Network redesign strengthens utility operations

A large regional electric utility needed to strengthen network security, performance, and reliability after experiencing major outages caused by design limitations and spanning-tree failures. With more than 60 sites spread across hundreds of miles, the existing network had become increasingly complex and difficult to manage.

A new architecture was developed with full redundancies and security segmentation to improve resilience. The design introduced a zone-based security model with VRFs and OSPF routing from the headquarters core to each site’s access layer, balancing security with budget constraints and the skill sets of operational staff. Resource Data supported the effort by documenting the network, creating a migration plan, and providing training and detailed documentation to ensure long-term scalability.

The redesigned network improved stability, security, and performance while preparing the utility for future growth. With a stronger foundation, the organization is continuing to expand capacity through fiber upgrades, new security appliances, and a secondary datacenter to support its long-term zero-trust strategy.

228.120 AKRR Microsoft 365@0.75x-8

Regional Transportation Organization

A secure, organization-wide Microsoft 365 rollout

A statewide transportation corporation with 600+ employees wanted to get more value from its Microsoft 365 licenses after migrating off its internal email system. To support collaboration, file sharing, and security across the business, the IT team needed guidance to set up the environment securely.

The project started with discovery sessions to confirm requirements and align the configuration with security standards. Pilot deployments confirmed Teams as the replacement for older collaboration tools. OneDrive addressed long-standing file storage and sharing issues. Resource Data also launched a SharePoint Online hub that gave administrators and staff one place to find training and support resources.

The rollout delivered a stable Microsoft 365 environment for internal and external users. Employees had simpler access to communication and file-sharing tools, and IT administrators were better prepared to manage and expand the platform over time.

3501.3 MNA Okta Integration@0.75x-8

Medical Network of Alaska

A Cleaner, Safer Way to Access Clinical and Office Tools

Medical Network of Alaska needed multi-factor authentication to meet cyberinsurance requirements and support a new electronic medical records system. Okta was selected to provide MFA and serve as the foundation for modern identity management.

Resource Data led the implementation, starting with analysis and architecture to address an unexpectedly complex identity environment. This work ensured Okta could function not only as MFA but also as the primary identity provider. Despite time adjustments to accommodate an EMR rollout, the integration was completed successfully.

Okta now serves as the source of truth for Office 365 and the service desk system, providing MFA for all staff through phone apps or hardware keys. A single sign-on portal gives easy access to Outlook, Teams, and other tools, with Okta positioned to extend to additional systems.

163.134 MSB Firewall Modernization@0.75x-8

Matanuska Susitna Borough

Stronger Security and Simpler Management for the Borough

Matanuska-Susitna Borough needed to replace an aging firewall platform that no longer met current security, reliability, or support standards. The environment increased costs, limited new security approaches, and complicated policy management.

After selecting a new platform, Resource Data redesign included configuration templates, diagrams, testing, cutover and rollback planning, and staff training. The transition was completed smoothly, with operational control handed off to Borough staff.

The upgrade added high-availability firewalls across key network layers, improved VPN for remote and mobile users, and modernized policy management to support zero-trust. Consolidating services and retiring unnecessary devices reduced operating costs while strengthening security.

550.4 NOAA Cloud migration@0.75x-8

Federal Fisheries Management Program

Protecting Fisheries Data With a Stronger Cloud Foundation

A fisheries management program serving federal, state, and international partners needed to move its fisheries tracking system from aging Oracle servers to Azure. The migration also required a security program strong enough to meet strict federal requirements.

The new environment was designed and provisioned with virtual networks, hardened servers, firewalls, and a SIEM integrated with threat intelligence feeds. Resource Data led the work to align with federal security standards and built a complete security framework, including a system security plan, more than a dozen policies, and a plan of actions and milestones.

With regular security drills, penetration testing, and ongoing monitoring, the program gained stronger governance and resilience to protect critical fisheries data. The cloud platform improved compliance, reduced risk, and created a sustainable foundation for long-term operations.

331.1 Mitchell Consult Data redesign@0.75x-8

Professional Services Consulting Firm

Making Complex Billing Changes Traceable and Secure

An Alaska-based organization that bills oil shipments through the Trans Alaska Pipeline needed stronger controls for a critical financial system. With millions of dollars at stake and regular audits, the existing data model could not handle complex revisions and relationships with enough security and traceability.

Resource Data redesigned the data model to support a fully versioned billing system, improving management of historical records and ongoing changes. The solution used C#, .NET MVC3, and JavaScript with jQuery, was tested with NUnit, and deployed through Jenkins. More than 500 automated tests provided continuous feedback.

The redesign delivered a secure, reliable billing system that improved accuracy and reduced audit effort, strengthening confidence in financial operations.

Cybersecurity Solutions

Security You Can Operate Under Pressure.

Security rarely fails all at once. It erodes quietly through unclear access, brittle controls, and designs no one can fully explain. We help you to restore discipline, reduce the potential “blast radius”, and turn security from a collection of tools into operations you can run, measure, and defend.

Cybersecurity_RW Solutions@0.75x-8

Identity Governance

Pass Audits with Access You Can Explain.

Many organizations when facing an audit realize identity has grown fragmented. Access lives across directories, apps, and ad hoc groups that no one fully owns. The solution is to consolidate identity into a single authoritative platform and remediate sprawl without disrupting daily work. SSO and MFA need to be integrated application by application, across cloud and on-prem systems, with cutover plans and rollback tests. Provisioning follows defined workflows tied to ITSM. Admin access is governed, reviewed quarterly, and documented. Now when auditors ask who has access and why, the answer is clear, current, and defensible.

Firewall Modernization

Cut Firewall Outages by Making Change Predictable.

Over time, firewall rules accumulate faster than they are reviewed. Exceptions linger. Ownership fades. Outages follow. Fixing scenarios such as this begin with cleaning rule sprawl and defining zone-based policies that reflect how traffic actually flows. High-availability pairs are implemented with pre-checks, post-checks, and rehearsed rollbacks. Next, traffic paths are mapped and validated before cutover. VPN, ZTNA, and SASE are tuned for users, not theory. Now exceptions are tied to an owner and an expiration date in ITSM. Finally, operations receives clear diagrams, runbooks, and review cadences so rule sets remain explainable during audits and incident reviews.

Cloud Security

Ship Regulated Cloud Workloads on Day One.

Cloud migrations often stall when security documentation no longer reflects reality. We build the landing zone first, then layer identity, logging, endpoint protection, encryption, and network controls before workloads move. Security telemetry flows into SIEM from the start. Hosts are hardened. Guardrails are enforced. The SSP, POA&M, diagrams, and runbooks are written to match what is deployed, not what was planned. Controls are validated through scans, tabletop exercises, and incident drills. Teams enter audits with evidence already collected and monitoring already in place, instead of scrambling to recreate history.

Network Segmentation

Limit the Impact of Potential Breaches

Flat networks fail quietly until they fail loudly. We have experienced that when incidents occur, lateral movement can spread faster than your teams can respond. We can help you redesign networks around service-based zones with explicit trust boundaries. Traffic paths are documented so teams know what should communicate and what should not. Segmentation is implemented using routing and isolation patterns, not fragile overlays. NAC and micro-segmentation reinforce the design. Ownership is recorded in ITSM and CMDB. Logging and telemetry provide visibility as environments evolve. Now when incidents happen, impact is contained, response is faster, and leadership understands what was protected and why.

Cybersecurity_Triptic 1
Cybersecurity_Triptic 2@0.75x-8
Bear Remien_Location Leader Block

Bear Remien

Service Area Lead, Systems Engineering

Bear Remien is an expert systems engineering leader with over 20 years of experience guiding organizations through complex infrastructure, security, and transformation initiatives. He combines deep technical judgment with steady leadership, enabling teams to design and operate resilient enterprise systems in highly regulated and operationally demanding environments. Bear is particularly effective at aligning stakeholders, shaping technical direction, and leading teams through high-risk efforts such as data center modernization, cybersecurity hardening, and large-scale organizational change.

Talk to Bear Remien

Bear Remien

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
Drop files here or
Max. file size: 128 MB.

    We never sell or share your information with outside parties. We always adhere to our privacy policy.

    This field is hidden when viewing the form
    This field is hidden when viewing the form

    What happens
    next?

    1. We'll schedule a conversation
    2. Share your challenges and goals
    3. Plan your journey together