• Business Architecture Design
  • Application Architecture Design
  • Information Architecture Design
  • Technology Architecture Design
  • Unified Communications Design

Enterprise Architecture links the business mission/vision, strategy, tactics and processes of an organization to its IT Strategy. In other words, the IT Strategy is aligned with the Business Strategy and a good CIO will ensure that IT serves the business and not the other way around. 


C-Level IT Governance - Cybersecurity

  • Chief Security Officer (CSO) Services
  • Chief Compliance Officer (CCO) Services
  • IT Governance
  • Information Assurance (IA)
  • IT Project Management - Cybersecurity/IA
  • IT Service Management - Cybersecurity/Defense-in-Depth
  • Systems Review and Planning
  • Business Process Management
  • Business Process and Workflow Design 
  • Vendor Consultations


The four perspectives we take when providing Cybersecurity services are Financial, Customer, Business and Learning

Business Value

We at TEKton Executive IT Group aim to deliver quality, cost-effective services while ensuring all business requirements are being met.  Below are the areas we focus on during any engagement with our clients:

  • Strategic Planning - Regulatory Compliance, Cybersecurity and/or Information Assurance
  • Capital Planning & Investment
  • Reduced Total Cost of Ownership (TCO)
  • Maximizing Return on Investment (ROI) to include targeting a sustainable Break Even Point
  • Technology Assessment: Development of a Site Survey/Assessment and IT Audit
  • Creation of an Information Technology (IT) Plan
  • Creation an Information Security (INFOSEC) Program
  • Creation of policies for the governance of IT
  • Process Improvement to include Performance & Results-Based Management
  • Improved Quality of Service
  • Improved Cybersecurity service alignment
  • Improved IT Governance

Regulatory Compliance

  • Federal Trade Commission (FTC) Red Flag Compliance
  • Gramm-Leach-Bliley Act (GLBA) of 1999
  • Fair and Accurate Credit Transactions Act (FACTA) of 2003
  • Federal Information Security Management Act (FISMA) of 2002
  • Health Insurance Portability and Accountability Act (HIPAA) of 1996
  • Sarbanes Oxley Act of 2002 - Section 404
  • DoD Information Assurance Certification & Accreditation Process (DIACAP)

Technical Training

Explain and Train
  • Certified Ethical Hacker (CEH) Training (v7)
  • Offensive Security 
  • Certified Information System Security Professional (CISSP)
  • Security+
  • Employee Security Awareness Training 
  • Learning Solutions (to include customized training)
  • Cisco Certified Trainers (ICND1 and ICND2)


We will also interview, recommend, mentor, train and support any full or part time IT personnel for your business.  We would then be in a support role for ensuring they have all the resources necessary to support the business.

TEKton Executive I.T. Group, LLC

email: info@tekton.biz

DoD 8570.01-M Training

To support the certification requirements set forth in DoD 8570.01-M, Information Assurance Workforce Improvement Program, TEKton Executive IT Group has specialized in DoD specific training to support this directive.  This consists of, but not limited to, COMPTIA Training (i.e., A+, Network+, Security+, etc.) and other types of courses such as CISSP, Cisco and Microsoft. 

Market News Feed
Content Coming Soon...
Learn More
CIO/CTO Corner
Learn More
Content Coming Soon...
Learn More