M

All lives are connected.

We work to protect it.

Identify adversarial attacks and vulnerabilities in AI/ML medical applications & technologies.

ABOUT VISHNU SYSTEMS

We help protect connected life!

Many cybersecurity companies begin with technology – we begin with people! We’re a cybersecurity company that exists to protect medical applications from adversarial attacks. Increasingly, healthcare providers and their patients depend on medical technologies to augment healthcare decisions and provide critical life support. Vishnu’s LotuX© provides vulnerability discovery into AI/ML models adopted for medical technologies. We believe humanity is connected through healthcare and cybersecurity can be used to protect the most vulnerable lives.

SOLUTION

LotuX™

LotuX™ is a vulnerability scanner to detect adversarial attacks against Artificial Intelligence/Machine Learning Models adopted for medical application technologies. LotuX™ empowers medical technology providers, developers, and researchers to evaluate, defend, certify, and verify Machine Learning models and applications against adversarial threats of Evasion, Poisoning, Extraction, and Inference. LotuX™ enables users to expedite development of novel medical technologies and discoveries with security and trust modalities.

Critical Healthcare Systems Security

As healthcare moves in a direction where Health Information Technology (HIT) and electronic health records (EHR) are ubiquitous, questions regarding the reliability of automated IT systems arise. LotuX™ helps protect the integrity of artificial intelligence decision making models for medical technologies. The development and evolution of Software as Medical Devices (SaMD), Telehealth, Internet of Medical Things (IoMT), and augmented medical procedures requires the reliability and trust in data output.

Medical/Health Threat Intelligence

HealthCare Intelligence (HCI) offers powerful, predictive analytic solutions for health care executives who need dependable information for strategic decision making and operational monitoring.

Adversarial Attacks

Adversarial attacks are machine learning methods that aim to trick machine learning models by providing deceptive input. Hence, it includes both the generation and detection of adversarial examples, which are inputs specially created to deceive AI/ML models. If used maliciously, these acts can result in the wrong decision outputs for critical healthcare technologies. LotuX™ is used to test AI/ML models against such attacks.

Data Integrity

Data integrity is a foundational aspect of healthcare providers and patient care centers. With the increasing sophistication of cyber threat actors, maintaining the integrity of AI/ML data has become a complex challenge. Medical manufacturers and technologists must navigate a dynamic landscape of evolving threats, regulatory requirements, and technological advancements. Compromised data integrity can lead to regulatory sanctions, financial losses, and damaged reputations to medical care providers.

Regulatory Compliance

The regulatory landscape for medical manufacturers and developers is very complex. With the Food and Drug Administrations (FDA) new cybersecurity compliance requirements, LotuX™ provides a comprehensive regulatory compliance capability that assures compliance (i.e., HIPPA, Medical device Reporting, ISO 13485, 21 CFR 820.22). Also includes industry recognized compliance and security modalities (i.e. MITRE, OWASP, NIST).

SOLUTIONS

R & D

Vishnu Systems, Inc. is continuously engaged in developing technologies and conducting research into securing healthcare ecosystems.

Zero Trust Security Systems

Research efforts that include designing modern security architecture that leverages network segmentation, lateral movement prevention, and simplifying user-access controls.

Homomorphic Encryption Systems

Mathematical methodology that allows encryption of data while ensuring privacy of data structures at the same time.

Artificial Intelligence/ Machine Learning

Research involving novel uses for neural network development. Discovery of anomalous network behaviors based on conditional learning models.   Deep learning explores the use of supervised and non-supervised neural network learning models.

Autoimmune Defense Systems™

Research into the capabilities of deep learning security systems: autonomous learning methodology, automated incident response, and virtual intensive care units (ICU) protection.

Team

CJ.Johnson

CEO/Founder

Curtis “CJ” Johnson is a four-time founder of technology and service startups with successful private merger and acquisition exits. CJ was previously the Head of Cyber-counterintelligence for Truist Bank (Previously SunTrust) and Director of Cyber Treat Intelligence Operations for Dragos, a cybersecurity start-up focused on critical infrastructure protection.

He’s a highly decorated cybersecurity professional who’s awarded the National Intelligence Certificate of Distinction by the U.S. Director of National Intelligence. His background includes global coverage in industries like FINTECH, National Security, Critical Infrastructure, and Research and Technology Protection.

CJ’s career started in the United States Navy as a Cyber Counterintelligence Agent. He has performed global operations and investigations for the CIA, FBI, NSA, and Department of Defense. He holds an M.S. Degree in Digital forensics and MBA from the Scheller School of Business.

When not protecting the worlds’ digital ecosystems, he’s advocating for a world that reduces its digital waste, investing, mentoring, and coaching tech start-ups at Atlanta Technical Village, located in Buckhead, GA.

Shreya Gupta

Shreya Gupta

Director of R&D, Co-Founder

With a background in founding startups and leading AI initiatives, Shreya brings real-world experience to address challenges stemming from the trust and adoption of Artificial Intelligence.

From developing empathetic conversation AI to collaborating with top-tier brands like Internet Brands and WebMD, her expertise spans diverse industries.

She’s featured in The Science Blog, Virtual Beings, and University of Southern California news, and has dedicated her career to democratizing AI. Her goal is to make this transformative Ntechnology accessible to all, not just exclusive corporations.

As a mentor, she’s committed to empowering women and students worldwide in the field of Data Science and AI. Through webinars, individual sessions, and mentorship programs like Women in
AI, USA, and Women In Engineering, UBC, she’s guided hundreds of aspiring professionals on their journey.

Passionate about knowledge sharing, she’s delivered engaging seminars and tech talks at various universities and IBM Data Science meetups. Topics range from Data Science fundamentals to career building and Emotional Intelligence.

Passionate about infusing emotions into AI and “BUILDING BOTS WITH A HEART,” Shreya’s on a mission to humanize technology and integrate empathy into artificial intelligence that results in intelligent systems that enhance human experiences

Eric “Deveric” Gitangu

Eric “Deveric” Gitangu

Director of Engineering, Co-Founder

Eric Gitangu is a highly skilled and passionate technology professional with a focus on blockchain technology, distributed and containerized application development with cloud architectures, and web and mobile application development with over 8 years of experience in Full Stack Development and SaaS implementation.

With prior experience as a lead developer, Eric has successfully created resilient and scalable Digital Addressing Infrastructure (DAI) solutions by applying AI & ML techniques. His expertise in AppSec, pentesting, and OWASP principles ensures the security of his applications. In addition to his technical strengths, Eric enjoys engaging in DIY projects and actively participates in programming competitions and bug bounties, constantly seeking opportunities to enhance his skills and stay at the forefront of the ever-evolving tech industry.

Theodore “Teddy” Scotto

Theodore “Teddy” Scotto

Director of Security & Trust

Results driven Certified Security Engineer and Vulnerability Manager. Teddy architects, implements, and leads technology solutions to protect corporate assets, increase organizational capability, and advance productivity in both corporate and federal organizations including FCC, USAID, DOL NIH and University of Maryland Medical Care Systems.

Skilled Cybersecurity subject matter expert (SME) armed with more than 15 years verifiable success in areas of Risk Management Framework (RMF), Systems Development Life Cycle (SDLC) and vulnerability assessment and management in FISMA data centers and in cloud environments. Equally comfortable with the technical configuration and written documentation required for System Security Plan (SSP) and Authorization to Operate (ATO).

Emery Williams

Emery Williams

Director of Product Development

Mr. Emery F. Williams graduated from Florida A&M University with a Bachelor of Science Degree in Computer Information Systems and has earned several Certifications in the Agile Methodology frameworks. He has been a Systems Business Analyst and Agile Coach for over 30 years.

Mr. Williams began his career as a Programmer Analyst at Sun America. He worked on the IBM Main Frame and the AS400 running batch processing. He then started programming using PowerBuilder as a consultant with many fortune 500 companies.

Mr. Williams then transitioned to being a Sr. Business Analyst where he would work with SME, Directors, and other Programmers to create Systems that are still be used today. With the ever-changing Computer culture Mr. Williams now works as a leading Agile Scrum Evangelist helping others understand the Scrum and Kanban process.

Contact Us

Address: 3423 Piedmont Rd NE, Atlanta, GA 30305 STE #397

Phone: (404) 855-4569

Email: info@vishnusystems.life