• HOME
  • SERVICES
    • CYBER SECURITY
    • RISK MANAGEMENT
    • DATA PRIVACY
    • PROCESS IMPROVEMENT
    • CHANGE MANAGEMENT
    • TRAINING
  • ABOUT
    • ADVANTAGES
    • METHODOLOGIES
    • A + RESULTS
    • CLIENTS
    • SPEAKING/WRITING
    • MISSION-VISION-VALUES
    • TEAM
    • PRESS RELEASES
  • CONTACT
  • BLOG
  • PODCAST

Abstract Forward Consulting Now Open For Business!

8 years ago
abstractfwd1987
No Comments

AbstractFwdHzTag300Over 14 years, Mr. Swenson had the honor and privilege of consulting at 10 organizations in 7 industries on progressively complex and difficult problems in I.T. including: security, proj. mgmt., business analysis, data archival and governance, audit, web application launch and decommission, strategy, information security, data loss prevention, communication, and even board of directors’ change management. From governments, banks, insurance companies, minority-owned small businesses, marketing companies, technology companies, and healthcare companies, he has a wealth of abstract experience backed up by the knowledge from his 4 degrees and validated by his 40,000 followers (from LinkedIn, Twitter, and his blog). Impressively, the results are double-digit risk reductions, corrected strategic decisions, vetted process improvements, and $25+ million on average or more in savings per project, and in some instances, up to $175 million!

In 2016, while consulting at Optum, Mr. Swenson decided to go back to graduate school to pursue a second masters degree in Security Technologies at the University of MN’s renowned Technological Leadership Institute. This degree was completed in 2017 and positions Swenson as a creative and security savvy Sr. consultant to CIOs, CTOs, CEOs, and other business line leaders. His capstone was on “pre-cursor detection of data exfiltration” and included input from many of the regions CIOs, CISOs, CEOs, and state government leaders. His capstone advisor was technology and security pioneer Brian Isle of Adventium Labs.

As the desire for his contract consulting work has increased, he has continued to write and speak on how to achieve such great results. Often, he has been called upon to explain his process and style to organizations and people. While most accept it and get on board fast, some aren’t ready, mostly because they are stuck in the past due to confirmation bias. Two great technology leaders, Steve Jobs (Apple) and Carly Fiorina (HP) often described how doing things differently would have its detractors. Yet that is exactly why there is a need for Abstract Forward Consulting. With a heart to serve many organizations and people, we have synergized a hybrid blend of this process and experience to form a new consulting firm, one that puts abstract thinking first to reduce risk, improve security, and enhance business technology!

Proudly announcing: Abstract Forward Consulting, LLC.

Company Mission Statement: We use abstract thinking on security, risk, and technology problems to move business forward!

Company Vision: To be the premier provider of technology and security consulting services while making the world a better and safer place.

Main consulting service offerings for I.T. and business leaders:

  1. Cyber Security
  2. Risk Management
  3. Data Privacy
  4. Process Improvement
  5. Change Management
  6. Training

If you want to have a free exploratory conversation on how we can help your organization please contact us here or inbox me. As our business grows, we will announce more people and tactics to build a tidal wave to make your organization the best it can be!

Thanks to the community for your support!

Founder and CEO: Abstract Forward Consulting, LLC.

Jeremy Swenson, MBA MSST (Master of Science In Security Technologies)

Previous Post
Three Unique Tech Trends in 2017 and Implications for 2018
Next Post
Review of the 2018 Verizon Data Breach Report

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

The reCAPTCHA verification period has expired. Please reload the page.

Recent Posts

  • The Importance of the 3-2-1 Back-Up Method.
  • No Interview Needed to Join Microsoft After Getting Fired From OpenAI – Sam Altman.
  • Seven Cyber-Tech Observations of 2022 and What it Means for 2023.
  • The Main Purpose of Cryptocurrency Mixer and/or Splitter Services is Fraud and Money Laundering.
  • Top 16 Ways SMBs Can Mitigate Cyber Risks and Threats.
X
LinkedIn

Recent Posts

  • The Importance of the 3-2-1 Back-Up Method.
  • No Interview Needed to Join Microsoft After Getting Fired From OpenAI – Sam Altman.
  • Seven Cyber-Tech Observations of 2022 and What it Means for 2023.
  • The Main Purpose of Cryptocurrency Mixer and/or Splitter Services is Fraud and Money Laundering.
  • Top 16 Ways SMBs Can Mitigate Cyber Risks and Threats.

Recent Comments

  • Abstract Forward Partners with Ignyte on Abstract Forward Partners With Newer Cyber GRC Tool: Ignyte Assurance Platform
  • Abstract Forward Partners with Ignyte | Ignyte Assurance Platform on Abstract Forward Partners With Newer Cyber GRC Tool: Ignyte Assurance Platform
  • Michael Kirk Please Interview US for your new Prince movie “Prince: R U Listening”! | Economic, Technology, & Marketing Thought Leadership on Social Tech CEO Jimmy Chamberlin Rejoins Smashing Pumpkins
  • Michael Kirk Please Interview US for your new Prince movie “Prince: R U Listening”! | Economic, Technology, & Marketing Thought Leadership on Prince and Purple Rain 30 years later: Business and Music Innovation
  • brianfpennington on Demystifying 9 Common Types of Cyber Risk

Archives

  • November 2023
  • January 2023
  • June 2022
  • April 2022
  • January 2022
  • June 2021
  • December 2020
  • August 2020
  • March 2020
  • January 2020
  • August 2019
  • March 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • December 2017
  • November 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • July 2016
  • May 2016
  • March 2016
  • February 2016
  • August 2015
  • June 2015
  • February 2015
  • January 2015
  • December 2014
  • August 2014
  • May 2014
  • April 2014

Categories

  • 2016 election hack
  • 2016 tech review
  • 360 net lab
  • 80s music
  • Alternative music
  • Amazon
  • Android
  • apple
  • arlines hack
  • artificial intelligence
  • Billy Corgan
  • Bitcoin security
  • british airways breach
  • Business
  • business analysis
  • business continuity
  • Chinese hackers
  • cloud computing
  • CoinHive
  • Coronavirus malware
  • COVID-19 scams
  • crypto mixing
  • Crypto Money Laundering
  • crypto-jacking
  • currency
  • cyber insurance
  • Cyber Security
  • cyber security framework
  • Cyber-Espionage
  • Cybersecuity summit
  • data back up
  • data breach
  • Data Exfiltration Detection
  • data security
  • Denial of Service (DoS) Attacks
  • Direct x12
  • disinformation
  • drones
  • election security
  • equifax breach
  • esports security
  • EU Privacy
  • FDIC
  • federal reserve
  • GDPR
  • gdpr test british airways breach
  • google glass
  • Google Mandiant
  • grc
  • GroupOn
  • iam
  • Ignyte Assurance Platform
  • iphone
  • Jimmy Chamberlin
  • leadership vs. management
  • LinkedIn
  • Live Streaming
  • LiveOne
  • Lumia Phone
  • management consulting
  • Microsoft
  • microsoft azure
  • Microsoft Continuum
  • MikroTik Routers
  • MN Start-Up
  • mobile os
  • mobile web
  • NASA
  • navy cyber hack
  • net neutrality
  • network intrusion
  • OpenStack
  • PBS Frontline
  • personal aircraft
  • phone market share
  • Prince: R U Listening
  • project management
  • Project Sparta
  • Purple Rain
  • Rackspace
  • ransomware
  • ransomware removal
  • retail
  • risk management
  • Salesforce
  • self driving cars
  • small business
  • small business cyber security
  • Smashing Pumpkins
  • SME Infosec
  • Social Media
  • socrates
  • sony pictures
  • stalkerware
  • Stuxnet
  • target
  • Tech Year In Review
  • third party risk management
  • Unit 61398
  • vendor risk mgmt
  • video surveillance
  • Web App Attack
  • WEP vs WPA2
  • Windows 10

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

All rights reserved © 2018 to present. Abstract Forward Consulting, LLC. Privacy Policy | Terms of Service | Web Accessibility | Sitemap.