Why Reveal Risk

We offer premium experienced resources with minimal overhead. Our experts know how to get things done within corporate environments and have significant breadth of practitioner experience.

read more

We Believe...

We believe you have to reveal your risks, impacts, and controls, before you can make practical decisions and investments. Without this, companies overspend, dilute their span of focus, underperform against commitments, and burn out their resources. Our approaches help to create focus amidst the whirlwind of technologies, tools, and priorities so that you finish what you start and reduce risk.

read more

Our Approach (at a glance)

  • We apply proven techniques that focus on risk-driven priorities, decisions and investments
  • We provide our top talent directly to you with a lean model that assures you always have skilled staff
  • We create solutions that “teach you to fish” and build breadth and depth of security expertise
read more

We help you reveal and realize the best risk-driven information security and privacy outcomes for your unique needs



Cyber risks in healthcare extend far beyond HIPAA compliance. The volume of healthcare-targeted cyberattacks (especially ransomware) has significantly risen in recent years as has the number of connected devices providing patient care, all while cost pressures continue.

Pharma / Biotech

Pharmaceutical and Biotech face a trifecta of existential business risks with significant cyber components: intellectual property theft (which usually represents more value than the raw ingredients themselves), manufacturing disruption, and compromise of clinical trial data.


Technology companies face a rapidly-changing landscape of partners and competitors and must deal with both risk to their own intellectual property and brand as well as the large volume of customer and consumer information they handle.

Financial Services

Criminals have always targeted banks because “that’s where the money is.” The modern financial system with thousands of partners means that the risk extends well beyond banks to include processors, intermediaries, and service providers that have been historically safe.


Retail has come a long way from the cash-for-goods transaction of old. Modern retailers deal with massive supply chains, point-of-sale malware, huge volumes of customer data, and distributed infrastructure, all while satisfying consumer demand for instant gratification.


The rise of Industry 4.0 and the connected plant is sparking a revolution in manufacturing. Industrial control (SCADA) and operational technology is more networked than ever before, creating new categories of risk

Our Experience
Speaks For Itself


Average Years of Corporate Experience




Satisfied customers



  • Deep Sea Phishing: A Taxonomy for Email Cyber Threats

    Email threats have become a persistent source of cyber security practitioner anguish.  However, a lack of understanding of the varieties of phishing, email attacks, and phishing using a variety of mediums can result in companies and their leaders thinking they are “covered” when they are not. This article is intended to be a taxonomy of

    February 20, 2019
  • Survival of the Fittest: IS Incident Response

    Author: Aaron Pritz– CEO, Principal Consultant, Co-Founder at Reveal Risk How many of your cyber security programs have a simple, well rehearsed incident response plan? It is likely that many companies have something resembling an IR (Incident Response) plan. It may even have that title if you can remember where it was stored. However, it is unfortunate that many leaders

    December 3, 2018
  • A Cloud Security Primer – “How to move from security concerns to security empowered”

    A Cloud Security Primer – by Tim Sewell (CTO, Principal Consultant, Co-Founder) “How to move from security concerns to security empowered”  It’s the new reality for business: the question enterprises are now asking about cloud is “How” not “If.” With features like rapid elasticity, consumption-based pricing, and access to affordable machine learning capabilities, the opportunities presented

    November 29, 2018
  • “Measure twice, cut once” – and other practical woodworking rules for cyber security and privacy

    Author: Aaron Pritz– CEO, Principal Consultant, Co-Founder at Reveal Risk Cyber security has seen a “gold rush” of mitigation tools, intelligence engines, and managed service providers. Buzzwords like Artificial Intelligence (AI), Machine Learning (ML), block chain, behavioral analytics, and deceptive technology. While there has been some really outstanding technical innovation coming into to the market,

    October 21, 2018