About Us:

Our Consulting Team

Our consultants are internationally recognized in computer and network security with extensive work in all aspects of security and privacy. We have considerable experience in a range of security activities such as security policy development, risk management and Threat and Risk Assessments (TRA), the selection/definition of security controls, network security architectures, Privacy Impact Assessments (PIA), Public Key Infrastructure (PKI), security education and awareness, and physical inspections and reviews. Cyberun ITSS has performed extensive security and privacy consulting services based on industry best practices for infrastructure design, complex product deployments and security and privacy assessment work for Fortune 100 companies in various industries, including health care, financial and banking services, and communications. We also have significant experience working with Government in a broad range of federal institutions with significantly different roles and responsibilities. With high security clearance levels, we maintain strict confidentiality regarding potential security vulnerabilities or privacy deficiencies discovered and company sensitive information.

Our team holds numerous professional security certifications including:

  • Certified Information System Security Professionals (CISSP)
  • Certified Information Security Managers (CISM)
  • Certified in Risk and Information System Controls (CRISC)
  • Certified Corporate Information Security Officer (C|CISO)
  • Holistic Information Security Practitioners (HISP)
  • RCMP-certified Physical Security Analysts
  • CSE-certified Common Criteria Evaluators (EAL 4)
  • Entrust-certified Consultants and Adminsitration
  • ITIL Foundation
  • Fortinet System Engineers
  • Certified Banyan Engineer and Specialist

Our Management Team

Darlene Lloyd, President and VP IT Security (Ottawa Office)

Ms. Lloyd has over 22 years of IT security experience and an extensive technical computer background that has permitted her to develop a strong security profile. She has performed many security audits and has given advice and guidance on information technology security to government departments, agencies, and private sector organizations. Ms. Lloyd has given many IT Security lectures and presentations to different security organizations. She has a strong ability to evaluate technological, architectural and design requirements and make recommendations to improve the security posture in keeping with the clients' security and business needs. Darlene has been involved in many areas of computer security including system security design and implementation, security product development and test, e-commerce, physical security, network security, database security, security policy development, threat risk assessments, security architecture, security management, public key infrastructure, security engineering, security audit, investigations and forensics, and security education and awareness.

Larry Werring, CEO and VP Systems Security (Pembroke Office)

Larry Werring is a security consultant and retired senior military officer with over 35 years experience in all aspects of security and policing. For the last 29 years he has been actively involved in the IT and physical security fields. During this time Mr. Werring has acted as a senior security and technology consultant for the private and public sectors, security architect on several major Crown IT initiatives, Departmental IT Security Coordinator for a Government department, security product design engineer for a vendor of authentication technology, Security Manager for a major Crown project, and a Base Security Officer responsible for all aspects of policing and security of a major DND operational base and a major DND classified computer facility. Larry has been involved in all areas of computer security including system security design and implementation, security product development and test, e-commerce, physical security, network security, database security, security policy development, threat risk assessments, security architecture, security management, public key infrastructure, security engineering, security audit, investigations and forensics, and security education and awareness.