Evaluating all C2's


It is the golden age of Command and Control (C2) frameworks. The goal of this site is to point you to the best C2 framework for your needs based on your adversary emulation plan and the target environment. Take a look at the matrix or use the questionnaire to determine which fits your needs.

The C2 Matrix Team

Cybersecurity Industry Leaders

Jorge Orchilles

Jorge Orchilles is a published author who holds post-graduate degrees from Stanford and Florida International University in Advanced Computer Security & Master of Science respectively. Jorge leads the offensive security teams in a large financial institution; is a SANS Certified Instructor; author of Security 564: Red Team Exercises and Adversary Emulation, CVSS, and a threat-led penetration testing framework; ISSA Fellow; and serves on the Board of Directors of the ISSA South Florida Chapter.


Bryson Bort

Bryson is the Founder of SCYTHE, a start-up building a next generation attack emulation platform, and GRIMM, a boutique cybersecurity consultancy, and Co-Founder of the ICS Village, a non-profit advancing awareness of industrial control system security. He is a National Security Institute Fellow and an Advisor to the Army Cyber Institute. Prior, Bryson led an elite offensive capabilities development group. As a U.S. Army Officer, he served as a Battle Captain and Brigade Engineering Officer in support of Operation Iraqi Freedom before leaving the Army as a Captain.

Bryson received his Bachelor of Science in Computer Science with honors from the United States Military Academy at West Point. He holds a Master’s Degree in Telecommunications Management from the University of Maryland, a Master’s in Business Administration from the University of Florida, and completed graduate studies in Electrical Engineering and Computer Science at the University of Texas.


Adam Mashinchi

Adam Mashinchi is the Principal Product Manager for Managed Detection and response at Red Canary, where he manages the strategy, roadmap, and development of the MDR solution. Before Red Canary, Adam defined and managed the development of enterprise security and privacy solutions with an emphasis on adversary emulation and usable encryption at a global scale, leading numerous technical integration projects with a variety of partners and services.

Adam brings with him a diverse technical background in enterprise systems administration, web and application development, mobile operating systems, and computer security. He holds a Master of Science in Applied Computer Science with a focus on computer security and encryption. Adam is a regular attendee and participant at cybersecurity conferences domestically and abroad having most recently presented at DEFCON's Red Team Village on insider threats in modern enterprises.