Skip to main content
Skip to main content
Defense / Manufacturing ConsultingCybersecurity20 weeks + ongoing 24/7

Enterprise Cybersecurity Transformation for Cornerstone Consulting Organization

Deploying a Full-Spectrum Security Operations Program Across a Distributed Consulting Workforce Serving the Defense Industrial Base

Breaches Since Deployment

0

Threat Detection Coverage

0%

Mean Time to Respond

0min

Workforce Secured

0%

Cornerstone Consulting Organization (CCO)

The Client

Cornerstone Consulting Organization (CCO)

ccoconsulting.com

Cornerstone Consulting Organization deploys hundreds of experienced advisers directly into manufacturing facilities, embedding within client operations to increase throughput, reduce waste, and improve profitability. Through affiliate companies Premier Staffing Solution (PSS) and Just-In-Time Staffing (JITS), CCO also places skilled trades professionals, engineers, and technicians into client facilities. Technology Transfer Services (TTS) provides rapid upskilling programs on production floors.

Founded and led by combat veterans, CCO has delivered billions in documented savings for Fortune 500 companies across automotive, aerospace, energy, defense, and heavy equipment manufacturing. The company operates from Toledo, Ohio, with consultants deployed to client sites across the United States and Europe, accessing proprietary production data, engineering specifications, and (for defense clients) controlled unclassified information.

The Challenge

The Problem

CCO's growth to $75 million in annual revenue had outpaced its security infrastructure. Standard business controls (commercial antivirus, basic email filtering, perimeter firewalls at headquarters) were designed for a traditional office, not a distributed workforce operating inside other organizations' networks while handling their most sensitive operational data.

Five risk areas demanded attention. First, distributed workforce exposure: consultants connecting from client facilities, hotels, airports, and home offices created attack surface that perimeter security could not reach. Second, email vulnerability: engagement proposals, FIT Operations reports, and sensitive production data flowed through email daily with only basic spam filtering. Third, zero threat visibility: no SIEM, no centralized logging, no way to answer 'is anyone attacking us right now?' Fourth, endpoint gaps: signature-based antivirus with no EDR capability and no centralized alerting. Fifth, a DNS blind spot: consultants on networks CCO does not control had no protection against DNS-based threats, tunneling, or command-and-control channels.

The defense industrial base dimension elevated the stakes. CCO consultants inside defense contractor facilities handle information relevant to national security. A compromised CCO system could become a supply chain attack vector into a defense manufacturer's network.

Our Approach

4 Phases. 20 weeks + ongoing 24/7.

Flynaut deployed a layered, integrated OneProtect cybersecurity program covering every domain of CCO's attack surface: EDR, MDR, SIEM, email security, DNS protection, identity and Zero Trust, threat intelligence, and vulnerability management.

01

EDR & Endpoint Hardening

4 weeks

CrowdStrike Falcon replaced legacy antivirus across all 340 CCO-managed endpoints. Falcon provides behavioral monitoring detecting fileless malware, living-off-the-land attacks, credential dumping, and lateral movement in real time. USB device control blocks unauthorized removable media. Full endpoint telemetry feeds our OneProtect SOC.

Endpoint protection alone is necessary but insufficient. The real value emerges when endpoint telemetry is correlated with email, DNS, identity, and SIEM data in real time.

02

SIEM, Email & DNS Security

6 weeks

Microsoft Sentinel deployed as centralized SIEM ingesting logs from 11 sources. Proofpoint Email Protection with TAP provides attachment sandboxing, URL rewriting, and BEC detection. DMARC deployed at reject enforcement. Cisco Umbrella provides DNS-layer protection that travels with every consultant regardless of network.

Monthly average: 4,700 email threats blocked and 12,400 malicious DNS queries blocked — primarily from consultant devices on client and hotel networks.

03

Identity, Zero Trust & Managed Security

6 weeks

Microsoft Entra ID Protection evaluates every sign-in against risk signals. Conditional access enforces Zero Trust: access requires compliant device, MFA, and acceptable risk score. Privileged accounts use FIDO2 hardware keys. OneProtect SOC provides 24/7/365 monitoring with cross-layer correlation.

Cross-layer correlation catches what single-layer monitoring misses: a medium-severity identity alert + medium-severity endpoint alert + medium-severity data access alert together tell the story of an active compromise.

04

Threat Intelligence & Vulnerability Management

4 weeks

Multi-source intelligence from CrowdStrike, Proofpoint, Cisco Talos, and defense-specific feeds from CISA, DCSA, and DIBNet. Tenable.io provides monthly authenticated scans with real-world exploitability prioritization. Remediation SLAs: critical within 72 hours, high within 14 days. Quarterly penetration tests and annual red team exercises.

Custom detection signatures are developed when campaigns targeting manufacturing consulting firms are observed and pushed to CCO's security stack within hours.

The Results

Performance That Speaks

Metric

Before

After

Change

Security Breaches

Unquantified (no detection)

Zero (18 months)

Zero

Threat Detection Coverage

<15% (AV only)

96% (multi-layer)

+540%

Mean Time to Detect

Unknown

4.2 minutes

New

Mean Time to Respond

Hours to days

8 minutes

-99%

Phishing Click Rate

28%

3.8%

-86%

Email Threats Blocked (monthly)

~200

4,700

+2,250%

DNS-Layer Blocks (monthly)

None

12,400

New

Endpoint Visibility

0% centralized

100% real-time

+100%

MFA Coverage

0%

100%

+100%

Critical Vulns Open

Unknown

<5 at any time

New

Incidents (18 months)

N/A

847 alerts, 23 confirmed, all contained

New

The most significant confirmed incidents included a targeted spear-phishing campaign impersonating a defense prime contractor, a credential stuffing attack using third-party breach data, a fileless malware loader via a compromised client network, and a DNS tunneling attempt from a compromised IoT device. Every incident was contained without data loss or client notification.

Technology

The Stack

EDRCrowdStrike Falcon
MDRFlynaut OneProtect SOC (24/7)
SIEM/SOARMicrosoft Sentinel (11 log sources)
Email SecurityProofpoint TAP + DLP
DNS SecurityCisco Umbrella
Identity/Zero TrustMicrosoft Entra ID Protection + PIM
Device ManagementMicrosoft Intune
Data ProtectionMicrosoft Purview
Vulnerability MgmtTenable.io
Domain AuthDMARC/SPF/DKIM (reject enforcement)
Threat IntelCrowdStrike + Proofpoint + Talos + CISA/DIBNet
Penetration TestingFlynaut Offensive Security (quarterly)
Security AwarenessProofpoint SAT (monthly simulations)

Reflections

What This Project Taught Us

Securing a consulting firm is fundamentally different from securing a company whose employees sit in a single office. CCO's consultants are nomadic by design. The security architecture must travel with the person, not depend on the perimeter. DNS-layer security, endpoint EDR, and identity-based Zero Trust are the three non-negotiable foundations for any distributed workforce.

The cross-layer correlation capability proved its value repeatedly. The most dangerous incidents were ones where no single layer would have generated a high-confidence alert alone. A medium-severity identity alert, a medium-severity endpoint alert, and a medium-severity data access alert are three dismissible events in isolation. Together, they tell the story of an active compromise.

CCO's veteran leadership brought a mission-oriented mindset that transformed this from a compliance exercise into an organizational commitment. When Bill Currence and Scott Wawrzyniak talk about cybersecurity, they talk about duty: to the defense manufacturers whose operations depend on CCO's integrity, to the veterans on their team, and to the national industrial base they strengthen every day.

Ready?

Ready to transform your digital experience?

Flynaut builds enterprise-grade digital experiences for brands that refuse to compromise.