Current Investments

delta risk logo vert color lg

The Chertoff Group Acquires Majority Stake in Delta Risk, LLC

Delta Risk provides cybersecurity services to commercial and government clients worldwide. Delta Risk's services include strategy, managed security operations, contigency planing, security and technical training, threat awareness, assessments and exercises.

 

 Coalfire LogoColor 01  

The Chertoff Group & The Carlyle Group Co-Invest to Acquire Majority Stake in Coalfire Systems

Coalfire provides a sophisticated portfolio of cybersecurity services, including Cyber Risk Advisory, Complaince and Risk Assessments, and LABS Technical Testing. Coalfire has more than 1,400 customers, over 300 employees and 12 locations across North America and Europe.

Press Releases

DELTA RISK LLC HIRES WESLEY VANDENBURG AS VICE PRESIDENT OF SALES

Former Trustwave Executive Brings Expertise in Managed Security Services, Team Building

SAN ANTONIO, TX — February 9, 2017 — Delta Risk LLC, a global provider of cyber security and risk management services, announced today that it has named Wesley VanDenburg as Vice President of Sales. VanDenburg will oversee sales strategy and client accounts for the company, and lead a team of inside and field sales representatives.

Read more
Coalfire Announces Acquisition of Cyber Security Leader, Veris Group

The Carlyle Group and The Chertoff Group announced today that Coalfire, a leader in cybersecurity risk management and compliance services, has acquired Veris Group. The strategic acquisition creates one of the largest providers of cyber security services in today's market, and was funded in part by new equity investments by affiliates of Carlyle and Chertoff Group.

Read more
Delta Risk Recognized as Top 10 Managed Security Service Provider of 2016

Enterprise Security Magazine highlited Delta Risk as one of the Top 10 Manged Security Services Providers of 2016. "Addressing the security and compliance needs in organizations, the team at Delta Risk leverages advanced security tools and processes to sift through the overwhelming amount of data to detect potential threats."

Read more.