Principals
Do the Work
Uncommon
Expertise
Hours
Not Days to Mobilize
Board Ready
Deliverables
Our Position
TRIFIDENT was founded on a simple premise: the private sector deserves access to the same caliber of cybersecurity expertise that protects national security interests. Our principals have led offensive and defensive operations at the National Security Agency, shaped federal cyber policy at the presidential level, and served as CISOs for Fortune 100 enterprises.
We serve a select clientele: private equity firms building cyber-resilient portfolios, family offices protecting multi-generational wealth, law firms safeguarding privileged communications, and leadership teams who refuse to be caught unprepared when crisis arrives.
You have likely experienced the alternative: a polished partner sells the engagement, then a rotating cast of junior consultants bills hours while learning on your dime. Deliverables arrive late, padded with boilerplate, reviewed by someone who never set foot in your building.
We operate differently. Every TRIFIDENT engagement is led and executed by a founding partner. The executive who scopes your project conducts your assessment. The advisor who presents findings wrote them. There is no leverage model, no bench of associates, no learning curve subsidized by your budget.
This model demands selectivity, and that is intentional. We focus on clients where our expertise creates decisive advantage. When you engage TRIFIDENT, you get decades of NSA, Fortune 100, and boardroom experience applied directly to your problem.
Capabilities
01
Tabletop exercises designed from real-world incident experience to prepare leadership teams.
Learn more02
Strategic roadmaps built to withstand sophisticated adversaries and align with business objectives.
Learn more03
Nation-state grade incident response capabilities for rapid containment and forensic investigation.
Learn more04
Fractional CISO services delivered by practitioners who have held the role at scale.
Learn more05
Practical, audit-ready programs for CMMC, NIST 800-171, NIST 800-53, and SOC 2.
Learn more06
Rigorous pre-transaction cyber risk evaluation for private equity firms and institutional investors.
Learn moreLeadership
Founding Partner
Dr. Ehrlich brings 25 years of experience at the intersection of offensive cyber operations, national security policy, and enterprise technology leadership. His decade at NSA included directing both offensive capabilities development and defensive operations for classified networks.
Chief of Operations, NSA defensive cybersecurity organization
Division Chief, NSA offensive cyber capabilities
Co-author, National Security Presidential Directive 54 (CNCI)
Chief Technology Officer, IronNet Cybersecurity
Director, Blackbird Technologies (acquired by Raytheon)
Fellow, National Security Institute, George Mason University
Founding Partner
A three-time CISO and successful entrepreneur, John Ford has built and led security programs across healthcare, technology, and telecommunications sectors. He founded and sold Sienna Group to ConnectWise, establishing himself as a trusted advisor to boards and executive teams.
CISO, ConnectWise, WellCare Health Plans, MCS Health Plan
Founder, Sienna Group (acquired by ConnectWise)
Global Professional Services Leader, IronNet Cybersecurity
Security Leader, Bell Labs / Lucent Technologies
U.S. Air Force Veteran
Founding Partner
A CISO and incident commander who built enterprise security programs from the ground up, Bill Swearingen has directed cyber defense operations protecting critical telecommunications infrastructure and led incident response for some of the world's largest organizations during major cyber events.
Chief Information Security Officer, CenturyLink
Senior Cyber Strategist & Red Team Lead, IronNet Cybersecurity
Contributor, National Cyber Security Strategy (Foreign Nation)
Founder, SecKC; DEF CON and Black Hat Speaker
CISSP, CISM, CMMC Registered Practitioner
Former TS/SCI Clearance (DoD Sponsored)
Our team includes professionals who contributed to the development of federal cybersecurity standards. We understand compliance requirements from the inside and build programs that pass audits while genuinely strengthening your security posture.
CMMC 2.0
Cybersecurity Maturity Model Certification
NIST 800-171
Controlled Unclassified Information
NIST 800-53
Federal Security Controls
NIST CSF 2.0
Cybersecurity Framework
SOC 2 Type II
Service Organization Controls
ITAR/EAR
Export Control Compliance
Insights
Practical Guide
Why traditional enterprise security frameworks fail mid-market companies - and a practical 90-day roadmap for building your first security program.
Checklist
10 questions to ask before hiring a security firm, red flags to watch for in proposals, and realistic budget expectations for your first assessment.
Client Confidentiality
Because we value the privacy of our clients, we will never disclose our client list. The same confidentiality we extend to them, we extend to every engagement. This commitment to discretion is why organizations across industries trust us with their most sensitive security matters.
Request a confidential briefing with a founding partner to discuss your organization's security posture, regulatory requirements, or active concerns.
Schedule a Consultation