Welcome to
MIKE ECHOLS
Cybersecurity Keynote Author
news and events
- feb 2024 – Mike provides a virtual keynote to ISACA
- Oct 2023 – Mike provides a keynote to shrm on ai opportunities and threats
- Sep 2023 – Mike Participates in the Rail AGe Webinar.
- Jun 2023 – Mike to Judge a National Science Foundation 5G Grant Panel.
- May 2023 – Mike will present to Lead Montgomery in Rockville, Maryland.
- Apr 2023 – Mike and the Max Team to RSA in San Francisco, California.
- Apr 2023 – Mike Launched “Cyber Spot Check” A new process for assessing a “Culture of Cybersecurity.”
- Apr 2023 – Mike delivers a speech to the Washington Center Accelerator.
- Mar 2023 – Mike briefs the TSA of cybersecurity operational resilience.
- Mar 2023 – Mike presents to the Chilean transportation delegation.
- Feb 2023 – Mike speaks on panel for the American bar association at the ritz Carlton in Orlando, Florida.
- Jan 2023 – Mike Speaks on developing “OT Culture of cybersecurity” in Orlando, Fl.
- Jan 2023 – Mike stands up a build chapter in Hampton Roads Virginia.
- Aug 2022 – Mike and the Max Team to perform pen-testing for the NSF.
- Aug 2022 – Mike Keynotes ISACA GRC conference. in Orlando, Fl. for more than 3000 Cyber Professionals
- Jun 2022 – Mike Named an Reviewer for the FAA’s Workforce Development Strategy.
Book Mike Echols to Keynote Your Event – Email info@maxcybersecurity.com
CEO, MAX CYBERSECURITY LLC
Michael A. Echols
Michael A. Echols CISSP, MBA
CEO Max Cybersecurity LLC, Keynote Speaker, Board Member IACI, Board Member of the University of Maryland Smith School, the Hispanic Heritage Foundation, and ICS-ISAC.
Mike spent 17 years in critical infrastructure protection and cybersecurity leadership at the Department of Homeland Security (DHS). Mike led several White House national cybersecurity and communications engagements – risk initiatives for the Bush and Obama Administration. Mike is now an international speaker on national resilience and has authored four Forbes online articles on secure Smart technology. Mike has provided keynotes for ISACA, the Canadian Economic Forum and many national security forums. He was featured on a PBS cybersecurity special called “Roadtrip Nation.” Mike is leading Max Cybersecurity in efforts to build a national culture of cybersecurity.
SECURITY
Managed SIEM
We offer a choice of comprehensive cyber security packages and managed SIEM offering advanced 360° protection, managed detection, response as well as training.
Compliance
Whether you need initial guidance or full support throughout your journey; we’ll help you meet compliance for a wide range of regulatory and security standards.
User Awareness Training
We’ll help you embed a strong culture of cyber awareness and good hygiene with tailored security training and phishing simulation ensuring your staff are the first line of defense.
Our Book
Secure Cyber Life:
This book is an extension of the experiences from a former Department of Homeland Security Cyber official. It’s not a spoiler to say the federal government isn’t going to save you in our 2020 cyber wars. The book points out that hackers have stolen billions of records in 2019 alone. No person is safe from potential identity theft or financial loss. The greatest advantage for hackers is the lack of awareness by the public. It is your data that is lost when a company is breached. The direct assault against you begins when that information from the breach is sold on the dark web. The only question left is, “whom are you going to call?” The Government Is Not Coming To Save You.
Why Choose Us
Secure Cyber Life:
This book is an extension of the experiences from a former Department of Homeland Security Cyber official. It’s not a spoiler to say the federal government isn’t going to save you in our 2020 cyber wars. The book points out that hackers have stolen billions of records in 2019 alone. No person is safe from potential identity theft or financial loss. The greatest advantage for hackers is the lack of awareness by the public. It is your data that is lost when a company is breached. The direct assault against you begins when that information from the breach is sold on the dark web. The only question left is, “whom are you going to call?” The Government Is Not Coming To Save You.
We’re Ready 24 Hours For You
Don’t be the next victim of a cyber attack
Start your cyber security journey today with a security audit to identify any weaknesses and potential risks
How We Work
Make This More Efficient
Our goal is to help reduce the risk of cyber attacks on businesses. We offer a range of cyber security and IT management services including Cyber Essentials Certification. We are here to help walk you through the process, providing clear advice on how to meet the standard and implementing those changes on your behalf if you require.
-
Security Consultancy
Develop and strengthen your strategy with tailored cyber security consultancy and vCISO services
-
Threats
Safeguard against the most common threats by achieving
-
Protection
Protect your digital identity from cyber criminals with a free dark web monitoring scan
-
Recovery Solutions
Ensure you can recover your business-critical data with our Disaster Recovery and Business Continuity solutions
Our Partrners
Over 150+ Partners Locations In The World
We work closely with selected industry-leading information security and business continuity partners to ensure we continually provide the most advanced solutions available.
Our Gallery
Faq's
We take pride in offering our customers complete solutions for convenient, one-stop shopping. See what they say about us.
I am item content. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar leo.
I am item content. Click edit button to change this text. Lorem ipsum dolor sit amet, adipiscing elit. Ut elit tellus, luctus nec mattis, pulvinar dapibus leo.
I am item content. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus ullamcorper mattis, pulvinar dapibus leo.
I am item content. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut luctus nec ullamcorper mattis, pulvinar dapibus leo.
I am item content. Click edit button to change this text. Lorem ipsum dolor sit amet, adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
I am item content. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar leo.
I am item content. Click edit button to change this text. Lorem ipsum dolor sit amet, adipiscing elit. Ut elit tellus, luctus nec mattis, pulvinar dapibus leo.
I am item content. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus ullamcorper mattis, pulvinar dapibus leo.
I am item content. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut luctus nec ullamcorper mattis, pulvinar dapibus leo.
I am item content. Click edit button to change this text. Lorem ipsum dolor sit amet, adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
What our clients say about us
We take pride in offering our customers complete solutions we select the best tools for each of our clients and manage things. See what they say about us.
Michael A. Echols is an awesome IT Consultant. I don’t have to worry if he’s doing the correct thing or doing a good job. He is efficient, works hard, super personable and skilled at what he does. 5 star rating!
Eric B.
Clients
Michael A. Echols was super helpful and provided thorough instructions to assist with troubleshooting my cyber security problem in my work. A great way of advising the problem! Thanks a bunch, Michael! I highly recommend it!
Charlene Leonard
Clients
We love Michael A. Echols Their way of it advising is very easy to work with and to save ourselves for future protection. Most importantly, they communicate very well. They handle everything from minor software issues to migrating our whole organization over to G Suite.
Joy James
Clients
Our News
Latest News
Cybersecurity And Risk Management Strategies
EVERYONE PLAYS A PART While the word cybersecurity has become synonymous with the IT department, be assured that it stretches...
When the Wrong Person Leads Cybersecurity
By Matthew Rosenquist Succeeding at managing cybersecurity risks is tremendously difficult even for seasoned professionals. To make situations worse, poorly...
Preparing for Disaster in Your Digital Environment
RONALD JACKSON Head of the Disaster Risk Reduction, Recovery for Building Resilience, UNDP Florida Ere is a single mother of...