CyberWA Logo

CyberWA Inc.

Elite Cyber Bodyguards

Continuous Protection Concierge Cyber Security Always Trusted, Always Discreet Security without Intrusion

Trusted for Over a Decade by Celebrities, Fortune 500 C-Suite Executives, Political Leaders, and the World's Most Discerning High-Net-Worth Families

10+
Years of Excellence
24/7
Personal Support
100%
Discretion Guaranteed

The CyberWA Difference

Decades of Battle Experience: For over two decades, our professionals have been on the front lines of the fight against cybercrime.

Over a Decade of Excellence: Ten years perfecting protection for HNW individuals, C-suite executives, and public figures.

Direct Personal Access: No automated responses or tiered support. No 1-800 numbers, phone trees, no queues, no automation. A direct call or text to your bodyguard, whenever you need them.

Absolute Discretion: Your privacy is paramount. Every interaction handled with utmost confidentiality.

Why Choose CyberWA

Tailored Protection: Custom security solutions designed specifically for your unique digital lifestyle, personal preferences, and individual threat profile.

Holistic Security: Personalized, concierge-level cyber security that seamlessly complements your physical security team for comprehensive, unified protection.

Your Security - Your Way: Fully adjustable to fit your lifestyle, adapting to the way you already work, communicate, and manage your daily activities.

Always-On Protection: Continuous security monitoring working discreetly behind the scenes, yet instantly available and responsive when it matters most.

Your Trusted Partner in Cyber Security

High-profile individuals face unprecedented cyber threats from sophisticated phishing to targeted attacks on reputation and assets. The risks are real and evolving.

You deserve better than generic solutions. Get a security partner who knows your name, understands your concerns, and protects what matters most.

About CyberWA

Elite concierge cyber security service protecting what matters most to you

Our Vision

To provide exclusive cyber security services customized to protect you and your digital life

Our Mission

Provide the highest quality cyber protective services on a very individualized basis

Our Values

Integrity, trust, confidentiality, quality, and responsiveness

Who We Are

Our team brings decades of frontline experience defending governments, critical infrastructure, and Fortune 500 enterprises against nation-state actors and organized cybercrime syndicates. This isn't theoretical - it's practical experience. Through proprietary tools and methodologies, we help in securing every dimension of your digital life - network infrastructure, communications, computing devices, authentication, financial transactions, smart home systems, AND YOUR FAMILY.

We don't react to attacks - we hunt them. Our entire leadership team has coordinated incident response during nation-state campaigns (APTs), disrupted criminal organizations, and protected the world's most critical assets when the stakes couldn't be higher. Our intelligence teams monitor the clear, deep, and dark web for exposed data, impersonation attempts, reconnaissance, and coordinated targeting. Our IT team works with the latest technologies to make sure they stay working for you.

The trust our clients place in us is sacred. When you partner with CyberWA, you gain elite professionals who have spent their careers protecting the highest-value targets, now focused entirely on protecting you.

Our Leadership Team

Will Pelgrin

Co-Founder & Executive Chair

Former President and CEO of the Center for Internet Security and founder of the Multi-State Information Sharing and Analysis Center (MS-ISAC). Internationally recognized cyber security expert.

Adnan Baykal

Co-Founder & CEO

Former Chief Technical Advisor for Global Cyber Alliance and creator of Quad9. Over a decade of experience in large-scale network monitoring, incident response, and cyber threat analysis.

Shehzad Mirza

Chief Security Officer

Former Senior Director of Security Operations at CIS, managing 24×7 SOC providing cybersecurity services to state and local governments nationwide.

Stacey A. Wright

Director of Cyber Threat Intelligence

Former Cyber Intelligence Analyst for the FBI. Over 25 years of cyber and law enforcement experience. International speaker on cybercrime and cybersecurity.

Margaret Morrissey

Chief Administrative Officer

24 years of experience in executive positions, essential to operational and administrative integrity across multiple organizations.

Frank Bultmann

Director of Organizational Services

Leader of strategic IT initiatives to enhance organizational effectiveness, operational security, and enterprise resilience. Over 20 years of experience.

Advisory Board

Brian Calkin

Advisory Board Member

Former CTO of the Center for Internet Security. Over 10 years of cybersecurity experience and featured in New York Times, Forbes, Bloomberg, and the Associated Press.

Edward G. Amoroso

CEO of TAG Cyber

Retired from AT&T after 31 years, culminating as Senior Vice President and Chief Security Officer from 2004 to 2016. Adjunct Professor at Stevens Institute of Technology for 27 years.

Elaine Duffy, Ph.D.

Founder and President of Able Organizations, LLC

25 years solving leadership problems for fast-growing companies. Clients include major law firms, Big Four accounting firms, and organizations across diverse industries.

Roberta G. 'Bobbie' Stempfley

VP, Business Unit Security Officer, Dell Technologies

Over 20 years of security and digital transformation experience. Former Managing Director of the CERT Division at Carnegie Mellon University's Software Engineering Institute.

Dave Wojeski

Founder and Managing Director of Wojeski & Company CPAs

Former Big Four accountant with substantial experience in strategic and tax planning, corporate structure, M&A. Founding partner in Valuation Resource Group, LLC.

Our Services

360 degrees of concierge cyber protection tailored to your unique needs

Personal Cyber Protection

Exclusive cyber bodyguard service providing personalized cyber protection to high net worth individuals, C-level executives, and celebrities.

  • Comprehensive cyber risk assessment
  • Digital footprint monitoring and management
  • Personal device security hardening
  • Smart home security configuration
  • Financial account protection
  • 24/7 personal support from dedicated expert

Organizational/Family Office Cyber Protection

Exclusive cyber security service providing tailored cyber protection to family offices and organizations.

  • Enterprise-wide security assessments
  • Network infrastructure protection
  • Security policy development and implementation
  • Employee security awareness training
  • Incident response and forensics
  • Ongoing monitoring and threat intelligence
CAP Logo

Cyber Audit Platform (CAP)

Our proprietary Cyber Audit Platform utilizes a methodology based on decades of international experience to assess susceptibility to cyber compromise.

60 Minutes

Comprehensive assessment completed in under an hour

8 Key Areas

Focused evaluation of critical security domains

Actionable Plan

Prioritized recommendations for improvement

Why Choose CyberWA Services

Elite Expertise

Team with decades of experience protecting governments and high-profile clients

Complete Confidentiality

Absolute discretion in all matters—your privacy is our highest priority

Concierge Service

Direct access to your dedicated security expert—no call centers, no delays

Personal Cyber Protection Service Tiers

The appropriate tier is determined based on several factors including an individual's level of public exposure, financial assets, cyber maturity, lifestyle, number of residences, frequency of travel, and history of threats. By carefully considering these factors and tailoring the cybersecurity services to each client's specific needs, CyberWA can provide the appropriate level of protection that balances security, usability, and cost-effectiveness for celebrities and high-net-worth individuals.

Service Tiers
Tier 1
Tier 2
Tier 3
Tier 4
CYBER BODYGUARD
Access to world-class cyber experts Unlimited 50 hours 10 hours 5 hours**
Dedicated cyber security bodyguard
Access to CyberWA executive leadership
Trusted advisor for cyber and technology decisions
RISK ASSESSMENT
Annual license to CyberWA Cyber Audit Platform (CAP)
Facilitated annual assessment of cyber security hygiene via CAP
Mapping of client's digital online footprint at initial onboarding
Annual mapping of client's digital online footprint
Develop a customized plan to address the cyber security needs of the client
ACTIONABLE INTELLIGENCE
Compromised credential notifications
Issue alerts and advisories on major cyber threats and attack campaigns
Identify and analyze targeted digital threat intelligence data
INFRASTRUCTURE SUPPORT
General IT support
Secure disposal of devices
LAYERED DEFENSE
Analyze, investigate and remediate cyber attacks
Extensive data removal
Cyber or IT support for family, friends, and household staff 10 hours
5 CAP licenses to give out to friends and family

EXTENDED OFFERINGS (RETAINER)

  • On-site cyber security home and threat assessment
  • Provide incident response for major cyber attacks
  • Deploy updates and security patches to OS and 400+ applications
  • Employ mobile device security and management (iOS and Android)
  • Provide forensic analysis for cyber incidents
  • Cyber security family awareness activities
  • Phishing, social engineering and ethical hacking activities
  • Table top exercises

Ready to Secure Your Digital Life?

CyberWA Insights

Insights, best practices, and the latest trends in cybersecurity for high-net-worth individuals and organizations

Team collaboration meeting
Organizational Recent

Why Organizations Must Perform Cyber Tabletop Exercises

In today's digital age, organizations continuously face cyber threats. Cyber tabletop exercises (CTTXs) help identify weaknesses, foster collaboration, and ensure readiness before a real attack occurs.

Key Benefits:

  • • Identify incident response plan weaknesses
  • • Foster cross-functional team collaboration
  • • Stay ahead of evolving threats
  • • Meet regulatory compliance requirements
Professional working from home
Executive Security Recent

Personal Cyber Protection at Home for Company Executives

Executives' home networks and personal devices are prime targets for cybercriminals seeking an entry point to corporate data. A breach can have cascading effects on both personal and organizational security.

Critical Points:

  • • Home networks lack corporate security measures
  • • Hybrid work blurs personal-professional lines
  • • Strong unique passwords for each account essential
  • • Two-factor authentication (2FA) is critical
Data analytics and charts
Best Practices Recent

An Incremental Approach to Cyber Security Assessments

Organizations face increasing cybersecurity threats. Comprehensive assessments are vital, especially for SMEs with limited resources. An incremental improvement model prevents overwhelming technical findings.

Why Incremental?

  • • Manageable for limited budgets
  • • Progressive security improvement
  • • Reduces assessment overwhelm
  • • Adapts to evolving threats
Business handshake partnership
Company News Recent

CyberWA and CIS Announce Partnership through CIS CyberMarket

As part of this collaboration, CIS and CyberWA's cutting-edge Cyber Audit Platform is now available through the CIS CyberMarket®, bringing enterprise-grade security assessments to organizations nationwide.

Partnership Benefits:

  • • Access to Cyber Audit Platform
  • • Available through CIS CyberMarket®
  • • Enterprise-grade assessments
  • • Nationwide availability
Cybersecurity protection shield
Case Studies Ongoing

Real-World Protection: CyberWA Success Stories

From preventing kidnapping attempts to recovering $1.5M in wire fraud, CyberWA has successfully protected high-net-worth individuals from digital privacy breaches, stalking, ransomware, and more.

Threats Handled:

  • • Kidnapping prevention & response
  • • $1.5M wire fraud recovery
  • • Digital stalking intervention
  • • Ransomware & malware remediation
Digital security and privacy
Best Practices Updated

Essential Cyber Hygiene for High-Net-Worth Individuals

Your digital footprint reveals more than you think. Learn essential practices for maintaining cyber hygiene, protecting your privacy, and securing your digital assets from sophisticated threat actors.

Key Topics:

  • • Digital footprint monitoring
  • • Smart home security
  • • Financial account protection
  • • Social media safety
Password security and protection
Best Practices Recent

Importance of Password Managers for High-Net-Worth Individuals

Password security is critical for high-net-worth individuals and celebrities, who are prime targets for cyberattacks due to their wealth, influence, and public visibility.

Key Benefits:

  • • Strong, unique password generation
  • • Protection against phishing attacks
  • • Breach monitoring and alerts
  • • Simplified security management

Stay Informed

Want to learn more about protecting your digital life? Contact CyberWA for expert guidance tailored to your unique security needs.

Contact Us

Our friendly team would love to hear from you

Address

PO Box 825
Latham, NY 12110

Availability

24/7 Support
For Active Clients

Get in Touch

Your information is handled with the utmost confidentiality and discretion

Privacy Policy

CyberWA is an exclusive cyber protective service company providing an elite security service for organizations, celebrities, corporate executives, and other discerning high net worth individuals who are frequent targets of cyber attacks.

CyberWA believes the privacy of its clients and their affiliates is of the utmost importance. This Privacy Policy describes how CyberWA handles and protects the personal information of its clients and their affiliates.

What Information Does this Privacy Policy Cover?

This Privacy Policy covers all Personal Information CyberWA collects from any source, including from our clients ("Clients"), our clients' affiliates such as family members ("Client Affiliates"), and prospective Clients and Client Affiliates.

We define Personal Information as any information that identifies or relates to a specific person or household, including all information obtained from Clients and Client Affiliates in the course of providing CyberWA services ("Services").

What Personal Information Does CyberWA Collect?

CyberWA collects Personal Information relating to our Clients' and Client Affiliates' cyber security profile and posture, including Personal Information:

  • you provide when you contact us to request information about CyberWA Services, such as your name, email address, and telephone number,
  • collected by us from Client and Client Affiliate devices and accounts when we are providing Services, and
  • obtained by us from publicly available and third-party sources, such as information about you on the Internet that could be used in a cyber attack.

How Does CyberWA use Personal Information?

CyberWA uses Personal Information for the following purposes:

  • to communicate with prospective Clients and Client Affiliates,
  • to communicate with and provide Services to Clients and Client Affiliates,
  • to maintain, improve, and develop new Services, and
  • to comply with applicable law.

When Does CyberWA Disclose Personal Information?

CyberWA discloses your Personal Information when you request that we disclose it, when necessary to provide the Services you have requested, or when required to make a disclosure required under applicable law.

As part of providing the Services, CyberWA may disclose your Personal Information to our subcontractors, vendors, or others who provide support services necessary for CyberWA to provide Services to you. We require our subcontractors and vendors to maintain the confidentiality of your Personal Information consistent with the requirements of this Privacy Policy.

If you are receiving Services pursuant to an agreement between CyberWA and a third-party, we may disclose limited Personal Information about the Services to such third-party.

CyberWA also may disclose your Personal Information as part of a business transaction in which CyberWA and/or its business are acquired by a third-party or when required to make a disclosure under applicable law.

Does CyberWA Sell or Share Personal Information for Marketing Purposes?

No. CyberWA does not sell or share Personal Information for marketing purposes.

How Does CyberWA Protect Personal Information?

CyberWA uses commercially reasonable physical, administrative, and technical cyber security controls to protect the confidentiality, integrity and availability of Personal Information held by CyberWA. While no one can guarantee 100% security, we work hard to protect Personal Information, including using encryption (where feasible and appropriate), restricting access to Personal Information based on a need to know, and using other information collection, storage, and processing procedures to minimize risk of inadvertent or unauthorized disclosure.

How Long Does CyberWA Retain Personal Information?

CyberWA retains Personal Information based on its business needs and legal obligations.

For example, we retain Personal Information we collect about Clients and Client Affiliates while providing Services to them until our business relationship ends. If we stop providing Services, we will delete or anonymize the Personal Information consistent with our standard backup and disaster recovery processes unless we are required to keep the information in identifiable format for legal reasons or other reasons.

If you have specific questions about our retention of Personal Information about you, please contact us using one of the contact methods described below and we will be happy to answer any questions you may have.

Do You Use Cookies or Other Tracking Technologies?

We use cookies and other tracking technologies on our website and in connection with providing the Services. For example, we may track Clients and Client Affiliates who open and/or click email links as part of a Services engagement to conduct a phishing exercise.

Do You Collect and Process Personal Information about Individuals Under the Age of 18?

We may obtain Personal Information about individuals under the age of 18 in connection with a specific Services engagement. We collect this information with the consent of parents, legal guardians, or others who have the legal right to provide the information to us. We use this Personal Information for the purpose of providing Services to our Clients and Client Affiliates.

Do You Transfer Personal Information Across Jurisdictions?

CyberWA is based in the United States of America and stores Personal Information in the United States. When providing Services to Clients located outside the United States, Personal Information may be transferred to the United States. When required by our Clients or applicable law, we will enter into data processing addenda governing the international transfer and processing of Personal Information.

What Rights Do I Have to My Personal Information?

CyberWA believes that your Personal Information belongs to you. We honor all reasonable or legally required requests by individuals to access, correct, or delete their Personal Information, unless we are prohibited from honoring the request under applicable law. To make a request relating to your Personal Information, please contact us using one of the contact methods described below.

Does This Privacy Policy Apply to Third-party Services?

We may recommend that you use a third-party service ("Third-Party Service") to address a specific cyber security vulnerability or threat. This Privacy Policy does not apply to Third-Party Services, which are governed by their own Privacy Policies. We encourage you carefully review the Privacy Policies of any Third-Party Service before providing Personal Information to or using the Third-Party Service.

Will This Policy Change?

CyberWA may change this Privacy Policy from time to time. We will provide notice of such changes on our website, through our applications, or by email if we have your email address.

How Do I Contact You?

If you have questions about this Privacy Policy, please contact us by sending an email to privacy@cyberwa.com. If you are a current Client or Client affiliate, you also can obtain more information about this Privacy Policy though your primary CyberWA point of contact.

Professional Services Agreement

Terms and Conditions

This PROFESSIONAL SERVICES AGREEMENT (this "Agreement") has been entered into by and between CyberWA, Inc. ("CyberWA") and the Client ("Client"). CyberWA and Client are sometimes referred to herein, individually, as a "Party" and, collectively, as the "Parties".

RECITALS

WHEREAS, CyberWA provides professional cybersecurity services ("CyberWA Services") to high net worth individuals, celebrities, organizations, and others who face significant cyber threats; and

WHEREAS, Client has a need for and wishes to receive CyberWA Services;

NOW, THEREFORE, in consideration of the recitals set forth above, the mutual covenants and promises set forth below, and other good and valuable consideration, the receipt and sufficiency of which is acknowledged, and intending to be legally bound, the Parties agree as follows:

1. Services

This Agreement applies to CyberWA's offering and provision of CyberWA Services to Client as described in one or more Statements of Work ("SOWs") executed contemporaneously with this Agreement or at a later date. This Agreement also applies to CyberWA's offering and provision of Services to Client's employees, customers, family members and/or other individuals or organizations affiliated with Client ("Client Affiliates") if specifically set forth in one or more SOWs entered pursuant to this Agreement.

2. Term

The term of this Agreement is one year commencing on the Effective Date (the "Initial Term"). This Agreement will automatically renew for successive one year terms (each a "Renewal Term"), unless one Party gives the other Party written notice of non-renewal at least ninety (90) days prior to the end of the then-current term.

3. Termination

Either Party may terminate this Agreement on thirty (30) days' advance written notice if the other Party breaches a material term of this Agreement and fails to cure the breach within the thirty (30) day notice period. If this Agreement terminates, all SOWs and End User License Agreements and Terms of Service ("EULAs") entered pursuant to this Agreement terminate on the same date. If this Agreement terminates prior to completion of the Services set forth in an SOW, Client remains liable for (a) all Services provided and expenses incurred by CyberWA up to the date of termination, (b) the pro rata value of the Services delivered prior to termination if fees are charged on a time period basis (e.g., monthly or annually), or (c) as expressly set forth in an applicable SOW.

4. Payment and Taxes

Client agrees to pay all fees, taxes, reimbursable expenses, and other charges within thirty (30) days of issuance of an invoice by CyberWA, unless other payment terms are expressly stated in an SOW. If Client fails to timely pay all amounts due, CyberWA shall be entitled to collect CyberWA's reasonable collection costs, including attorneys' fees and late fees calculated at the rate of one and half percent (1.5%) per month.

5. Relationship of the Parties

CyberWA, Client and Client Affiliates are independent contractors. Nothing contained herein or in any other agreement shall be construed as creating an agency or joint venture relationship between CyberWA and Client or any Client Affiliate. CyberWA shall not have any power to create any obligation, express or implied, or incur any liability on Client's or any Client Affiliate's behalf without the express written consent of the Client and/or Client Affiliate to be bound. Neither Client nor any Client Affiliate shall have any power to create any obligation, express or implied, or incur any liability on CyberWA's behalf without the express written consent of CyberWA.

6. EULA Required

If an SOW provides that CyberWA will provide services directly to Client Affiliates, each Client Affiliate must execute a EULA in a form acceptable to CyberWA before CyberWA is required to provide Services to the Client Affiliate. Client and each Client Affiliate that uses any CyberWA electronic application, including CyberWA's Cyber Defense Tool, also must execute a EULA before using such application.

7. Personnel and Control of Performance

CyberWA shall retain exclusive control over all aspects of the CyberWA Services provided under this Agreement. CyberWA will assign those personnel who CyberWA believes, in its sole discretion, are qualified to provide the CyberWA Services and shall have exclusive control over the method, manner, means and timing of the CyberWA Services provided. Personnel assigned by CyberWA may be CyberWA employees or independent contractors. CyberWA shall be responsible for paying all compensation and benefits, if any, owed to CyberWA personnel who perform CyberWA Services.

8. Confidential Information

Client and CyberWA (each, a "Receiving Party") acknowledge that each of them may be exposed to or acquire "Confidential Information" which is information that is proprietary or confidential to the other Party, to the other Party's affiliates, or to third parties to which the Party disclosing the information ("Disclosing Party") owes a duty of confidentiality.

(a) Neither Party shall copy, reproduce, sell, assign, license, market, transfer or otherwise dispose of, give or disclose the other Party's Confidential Information to third parties or use Confidential Information for any purposes other than the performance of this Agreement.

(b) Each Party shall advise its employees, agents and subcontractors (and their employees) who may be exposed to the Confidential Information of their obligation to keep such information confidential.

(c) If a Party receives a request to disclose Confidential Information pursuant to a subpoena, court order, or other legal process, the Receiving Party shall, unless otherwise required by law or court order: (i) promptly notify the Disclosing Party of the existence, terms and circumstances surrounding such request; (ii) consult with the Disclosing Party on the advisability of taking legally available steps to resist or narrow such request and cooperate, at the Disclosing Party's sole expense, with the Disclosing Party on any steps the Disclosing Party considers advisable or necessary; and (iii) if disclosure of the Confidential Information is required or deemed advisable by the Disclosing Party, exercise commercially reasonable efforts to obtain an order, stipulation or other reliable assurance acceptable to the Disclosing Party that confidential treatment shall be accorded to such Confidential Information to be disclosed.

(d) Confidential Information shall not include information that is: (i) in or becomes part of the public domain other than by disclosure in violation of this Agreement; (ii) demonstrably known to the Receiving Party previously, without knowledge of a duty of confidentiality applicable to such information; (iii) independently developed by the Receiving Party outside of this Agreement and without reference to or use of Confidential Information; or (iv) rightfully obtained by the Receiving Party from third parties without a duty of confidentiality.

(e) CyberWA will maintain the confidentiality of all information received from Client or Client's affiliates in perpetuity unless such information ceases to be confidential pursuant to Section 8(d) above. Each Party is required to maintain the confidentiality of trade secrets for so long as the information remains a trade secret under applicable law. Each Party is required to maintain the confidentiality of all other Confidential Information for three (3) years following termination of this Agreement.

9. Non-Solicitation

Client agrees that during the period of this Agreement and for a period of twelve (12) months after this Agreement expires or is terminated, Client shall not, without CyberWA's prior written consent, directly or indirectly, encourage any CyberWA personnel to (i) leave the employment of CyberWA or (ii) not provide services on behalf of CyberWA.

10. Intellectual Property

(a) CyberWA's trademarks, service marks, copyrights, patents, trade secrets, and all other proprietary rights in or related to CyberWA Services are the exclusive property of CyberWA and/or CyberWA's licensors ("CyberWA Intellectual Property"), whether or not registered, recognized, or perfected under applicable law.

(b) Client expressly agrees that all materials and information used, developed or acquired by CyberWA to perform Services, including any inventions and discoveries or derivative works of any kind that are developed by CyberWA pursuant to this Agreement are CyberWA Intellectual Property and shall be owned exclusively by CyberWA. Unless otherwise expressly set forth in an SOW, no CyberWA Services or materials provided to Client or any Client Affiliate ("Deliverables") shall be considered a "Work for Hire."

(c) It is understood and agreed that CyberWA sells the same or similar services to other clients and CyberWA may modify the services provided to other clients based on its experience in performing CyberWA Services pursuant to this Agreement.

(d) CyberWA Intellectual Property may not be copied, distributed, republished, uploaded, posted, or transmitted except in connection with the authorized use of the Services. Client may not alter, decompile, disassemble, reverse engineer, or otherwise modify any CyberWA Intellectual Property.

11. Limited License

CyberWA provides Client and each Client Affiliate receiving CyberWA Services with a limited, non-transferrable, non-exclusive, revocable license to use CyberWA Services, including any Deliverables for the limited purpose set forth in each applicable SOW and/or EULA. Nothing herein shall be construed as granting Client, any Client Affiliate or any other person, whether by estoppel or otherwise, any license or other rights to CyberWA Intellectual Property except for those expressly granted in this Section 11.

12. Client Data Security Practices

Client is responsible for the safekeeping and integrity of any account provided by CyberWA for use of the Services ("Account"). Each Account is for a single user only and multiple users may not share login credentials under any circumstances. CyberWA assumes no liability or responsibility for Client's or any Client Affiliate's failure to maintain the integrity of its Account(s) and the confidentiality of login credentials. Client and Client Affiliates are responsible for taking commercially reasonable measures to protect the security of devices on which any CyberWA Services are installed.

13. Compliance with Privacy and Data Protection Laws

CyberWA will handle all personally identifiable information ("PII") received in connection with this Agreement in accordance with all applicable privacy and data protection laws and regulations as set forth in CyberWA's Privacy Policy, which is expressly incorporated in this Agreement. https://cyberwa.com/privacy/

14. Client Representations and Warranties

Client represents and warrants that (a) it has the right to enter into this Agreement; and (b) it has the right to provide CyberWA with access to devices, accounts, and information necessary to provide the CyberWA Services to Client and/or Client Affiliates.

15. CyberWA Representations and Warranties

CyberWA represents and warrants that (a) it has the right to enter into this Agreement; (b) it has all necessary rights, authorizations, and licenses to provide the Services; (c) CyberWA's performance under this Agreement will not violate any other agreement to which CyberWA is a party; and (d) CyberWA will use commercially reasonable physical, administrative, and technical controls to protect the confidentiality, integrity, and availability of the CyberWA Services and Client's Confidential Information processed by CyberWA. For the avoidance of doubt, CyberWA does not guarantee that its Services, many of which are delivered over the internet, are 100% secure and CyberWA's representation and warranty in this Section 15 does not relieve Client of its own data security obligations set forth in Section 12, above.

16. CyberWA Warranty Disclaimer

EXCEPT FOR THE EXPRESS WARRANTIES SET FORTH IN SECTION 15, ABOVE, CYBERWA GIVES NO OTHER EXPRESS, IMPLIED OR STATUTORY WARRANTIES, INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT OF THIRD-PARTY RIGHTS, OR WARRANTIES ARISING FROM COURSE OF DEALING, USAGE OR PRACTICE. CYBERWA DOES NOT WARRANT AGAINST INTERFERENCE WITH CLIENT'S OR ANY CLIENT AFFILIATE'S ENJOYMENT OF THE SERVICES, THAT THE SERVICES WILL MEET CLIENT'S OR ANY CLIENT AFFILIATE'S REQUIREMENTS, THAT THE OPERATION OF ANY SERVICE WILL BE UNINTERRUPTED OR FREE FROM ERRORS, BUGS, CORRUPTION, LOSS OF DATA, INTERFERENCE, HACKING OR VIRUSES, OR THAT THE SERVICES WILL INTEROPERATE OR BE COMPATIBLE WITH ANY OTHER SOFTWARE. CYBERWA ALSO DOES NOT WARRANT OR GUARANTEE THAT THE SERVICES WILL IDENTIFY ALL VULNERABILITIES OR THREATS, OR THAT FOLLOWING ANY CYBERWA RECOMMENDATION WILL PREVENT CLIENT OR ANY CLIENT AFFILIATE FROM SUFFERING LOSS, DAMAGE, OR INJURY. SOME JURISDICTIONS LIMIT OR PROHIBIT DISCLAIMERS OF IMPLIED WARRANTIES, IN WHICH CASE THE DISCLAIMER OF IMPLIED WARRANTIES HEREIN MAY NOT APPLY.

17. Limitation of Liability

CYBERWA AND CLIENT HAVE DISCUSSED THE RISKS AND BENEFITS OF THE AGREEMENT AND THE COMPENSATION TO BE PAID TO CYBERWA. TO THE MAXIMUM EXTENT PERMITTED BY LAW, CLIENT AGREES, FOR ITSELF AND ANYONE CLAIMING BY, THROUGH OR UNDER IT (INCLUDING ALL CLIENT AFFILIATES), THAT THE LIABILITY OF CYBERWA, ITS SUBSIDIARIES, AFFILIATES AND SUBCONTRACTORS (INCLUDING THEIR RESPECTIVE OFFICERS, DIRECTORS, EMPLOYEES, SUCCESSORS AND ASSIGNS) FOR ANY AND ALL CLAIMS AND CAUSES OF ACTION (INCLUDING WITHOUT LIMITATION, CLAIMS AND CAUSES OF ACTION BASED ON TORT, CONTRACT, STRICT LIABILITY, OR INDEMNITY) ARISING OUT OF, RELATED TO, OR IN CONNECTION WITH THIS AGREEMENT AND USE OF THE SERVICES SHALL NOT EXCEED THE FEE PAID TO CYBERWA FOR SERVICES PROVIDED TO SPECIFICALLY AFFECTED CLIENT AFFILIATES, OR ONE THOUSAND U.S. DOLLARS ($1,000), WHICHEVER IS GREATER. IN ADDITION, CYBERWA SHALL NOT BE LIABLE TO CLIENT, CLIENT AFFILIATES, OR ANY OTHER PERSON FOR LOSS OF PROFITS OR REVENUE, LOSS OF USE OR OTHER OPPORTUNITY, LOSS OF GOODWILL OR OTHER CONSEQUENTIAL, INCIDENTAL, INDIRECT, EXEMPLARY, OR PUNITIVE DAMAGES. CLIENT ACKNOWLEDGES THAT (A) WITHOUT THE INCLUSION OF THIS LIMITATION OF LIABILITY PROVISION, CYBERWA WOULD NOT PERFORM THE SERVICES AND (B) THIS LIMITATION OF LIABILITY PROVISION IS MERELY A LIMITATION, AND NOT AN EXCULPATION, OF CYBERWA'S LIABILITY.

18. General

(a) Entire Agreement. This Agreement contains the entire agreement between the Parties with respect to its subject matter. This Agreement supersedes all prior agreements or understandings between the Parties pertaining to the subject matter of this Agreement.

(b) Modification. This Agreement may not be amended, altered, or modified, in whole or in part, except in a writing executed by the Parties. If the Parties wish to modify any term of this Agreement in an SOW, the intent to modify such term must be expressly stated in the SOW.

(c) Enforceability; Priority of Interpretation. If any portion of this Agreement is held to be unenforceable, the unenforceable portion shall be construed in accordance with applicable law as nearly as possible to reflect the original expression of the Parties and the remainder of this Agreement shall remain in full force and effect. Any conflict or inconsistency between this Agreement, any SOW and any EULA shall be resolved in the following order: (i) this Agreement; (ii) the SOW; and (iii) the EULA, except as provided in Section 18(b).

(d) Waiver. A Party's failure to insist upon strict adherence to any term of this Agreement on any occasion shall not be considered a waiver thereof or deprive that Party of the right thereafter to insist upon strict adherence to that term or any other term of this Agreement.

(e) Force Majeure. Neither Party shall be liable for any failure to perform its obligations in connection with this Agreement, if such failure results from any act of God, riot, war, civil unrest, flood, earthquake, public health emergency, or other cause beyond such Party's reasonable control (including any mechanical, electronic or communications failure, but excluding any such failure caused by a Party's financial condition, negligence or intentional conduct).

(f) Headings. The headings in this Agreement are for convenience only and do not affect the interpretation of any term.

(g) Mutual Drafting. This Agreement is the result of negotiations between the Parties and shall be considered as being mutually drafted by the Parties. Any uncertainty or ambiguity in the Agreement shall not be interpreted against any one Party.

(h) Assignment. This Agreement may not be assigned without the written consent of the non-assigning Party, except that consent is not required for either Party to assign this Agreement to a successor in interest whether by reorganization, merger, or sale of all or substantially all of the Party's assets.

(i) Notices. All notices, statements or other documents which are required or contemplated to be given hereunder ("Notices") shall be in writing and delivered personally, sent by overnight courier, mailed by certified or registered mail, or sent by electronic mail transmission, addressed to appropriate Party at the address of such Party set forth below or at such other address as such Party shall have theretofore designated by written notice delivered to the Party giving such notice to:

If to CyberWA: Adnan Baykal at PO Box 825, Latham NY 12110
If to Client: to the person and address listed in the Statement of Work

All Notices shall be deemed received upon delivery, except Notices sent by email which shall be deemed received upon transmission provided that a duplicate Notice is provided by any of the other means set forth in this Section.

(j) Survival. The following provisions survive termination of the Agreement: Section 8 (Confidential Information), Section 9 (Non-Solicitation), Section 10 (Intellectual Property), Section 16 (CyberWA Warranty Disclaimer), Section 17 (Limitation of Liability), and any other provision where necessary to give effect to the provision's meaning and terms.

(k) Governing Law. This Agreement shall be governed by and construed in accordance with the laws of the State of New York, without regard to its conflict of laws provisions.

(l) Consent to Jurisdiction; Venue. Each Party irrevocably agrees that venue for any dispute arising under this Agreement shall lie exclusively in the state and federal courts located in Albany, New York and waives any right to object to jurisdiction within either of the foregoing forums. EACH PARTY HEREBY IRREVOCABLY WAIVES TO THE FULLEST EXTENT PERMITTED BY APPLICABLE LAW ANY AND ALL RIGHT TO TRIAL BY JURY IN ANY LEGAL PROCEEDING ARISING OUT OF OR RELATED TO THIS AGREEMENT.

(m) Signatures and Counterparts. This Agreement may be executed in counterparts, each of which will be deemed an original and all of which together will constitute one and the same instrument. This Agreement may be executed by manual or electronic signatures. The Parties agree that: (i) any such electronic signatures are intended to authenticate this writing and to have the same force and effect as manual signatures; and (ii) for purposes of this Section 18(m), "electronic signature" means any electronic sound, symbol, or process attached to or logically associated with a record and executed and adopted by a Party with the intent to sign such record. Delivery of an executed copy of this Agreement by email or other means of electronic transmission constitutes valid and effective delivery.