Information Technology Services Company

True North Security

3%

Funding Goal $3,500,000
Funding Raised So Far $10,000
Funding Commitments $100,000
Funding Remaining $3,390,000
Funding Type Equity
Pre-Money Valuation
Investor Ownership
Interest / Dividend
Previous Funding

Company Overview


True North Security improves cybersecurity and allow users to grow with an expansive library of content, real-world security simulations, and gamified learning environments.

Read More
lock icon

Unlock Company Profile

Sign up now to unlock full company profiles and access financials, investor documents, and engage companies.

Business Summary


Company Age 7 months
Employees 3
Sub-Industry Other Information Technology Services
Prior Year Revenue
Current Year Revenue
Next Year Revenue

Products/Services


Constellations

The Constellations platform offers an extensive library of content for organizations to offer a "university" for learners to access. From OPM-regulated training to compliance training such as SOC 2, CIS 20, NIAP CC, and FIPS I 40-3, Constellations offers a variety of content and plans on integrating AI to recognize different courses learners have accessed and completed as well as recommending similar or more advanced courses. The platform will provide metrics to an administrative portal for managers to review anytime.

Being fully automated, learners are notified to complete required pieces of training, receive alerts to complete current courses and receive alerts on new/related courses. True North Security provides content approved by the Office of Personnel Management but will provide a library of content to allow organizations to customize courses while maintaining compliance with the integrity of the course structure.

StarPhish

StarPhish is a phishing simulation platform where administrators can create, run, and manage phishing campaigns. The admin portal will offer a library of templates to use that are based on real-world phishing scams that have been utilized and proven to be effective. Administrators can use these templates and create their targeted campaigns to send out to specific user groups within the organization. Admins can generate reports on the campaigns run from these campaigns, gathering information on which user groups fell victim to which campaign and what user falls victim more often than not. The system will then trigger the Constellation platform to administer required training to help the learner better understand phishing, its risks, and how to mitigate it.

Management


Timothy Welty
Chief Executive Officer
Timothy Welty

I am a UI/UX designer by trade with degrees in cybersecurity and a passion to innovate the way we learn about cybersecurity in the workforce. I am looking to invigorate the federal landscape with gamified e-learning capabilities to help bolster the new wave of employees coming in with fresh technology that easily captivates the user's engagement. We believe that with a gamified experience, we can allow users to passively learn everything they need to know and help gear them to your set security posture.

Veronica Lu
Chief Operating Officer
Veronica Lu

Brand evangelist, Marketing Manager, Project Ownership, and Website Administrator in a wide variety of business applications. Interested in online marketing, human behavior, and brand development. Focused on company growth; specifically increasing profit.

Driven digital marketing manager with hands-on experience in the planning and execution of ideas and strategies. Known for being self-managed, a team player, analytical, curious, and creative. Proven communication, project management, and technical skills. Experience in ecommerce development, growth marketing, email campaigns, social media initiatives, and PPC expansion. Currently an advisor and investor in 2 small businesses within the car and retail space.

Rigoberto Fernandez
Chief Information Officer
Rigoberto Fernandez

Rigoberto “Rigo” Castillo Fernandez is a cybersecurity professional with eight years of experience in project management, leading and building teams, and developing network architectures within the private, public, and commercial sectors. His expertise includes building network architectures from a start to completion with the alignment of the zero-trust model across multiple domains, from local site infrastructures to cloud deployment. Through his career he has pursue and obtained several cybersecurity certifications to prepare for a bigger challenge in this new role, in addition to holding a MS in Cybersecurity Management and Policy, BS in Computer Networks and Cybersecurity and ASS of Cybersecurity.

Investors/Lenders


Individual Investor
Timothy Welty

Self-funded investing to start the initial start up phase.

Amount
Investment Type
Investment Round
Investment Date

3%

Funding Goal $3,500,000
Funding Raised So Far $10,000
Funding Commitments $100,000
Funding Remaining $3,390,000
Funding Type Equity
Pre-Money Valuation
Investor Ownership
Interest / Dividend
Previous Funding

Documents


Contact


True North Security

Spotsylvania, VA 22551, US

Top 10 Tips for Entrepreneurs Seeking Funding

Users who follow these tips increase their fundraising odds substantially.

  • Complete Your Funding Profile
    • Complete your funding profile with all sections filled, including your products and services, a complete management team with headshots, and slideshow with product images.
  • Complete a Business Plan
    • Complete a Business Plan in EquityNet and refine your financial projections using the benchmarking alerts in the Business Plan Analysis report.
  • Upload Important Investment Documents
    • Upload and present any other important investment documents such as pitch decks, financial statements, and offering materials.
  • Use EquityNet Crowdcast
    • Use the EquityNet Crowdcast system to automatically email invitations to your contacts in order to build additional exposure for your company.
  • Construct Concise Introductory Messages
    • Construct and send a concise introductory message to investors, including primary reasons why they should want to invest such as KPIs, expected returns, and forecasted revenue.
  • Be Proactive in Messaging Investors
    • Be proactive in messaging many investors and include a simple way for them to connect with you for a web meeting or call, such as a Calendly link.
  • Use the Activity System
    • Use the Activity system to track interested investors, and send prompt follow-up messages to investors who viewed your profile or showed interest.
  • Prepare for Due Diligence
    • Prepare for due diligence questions by interested investors and use your Business Plan and investment documents to satisfy such requests.
  • Keep Your Funding Profile Updated
    • Keep your funding profile updated with new funding raised/committed and message interested investors with any new milestones achieved.
  • Do Not Respond to Unknown Investors
    • Do not respond to or engage any parties outside of EquityNet that are not listed as approved investors (this may happen due to your public profile and LinkedIn connections).