Daron M. Hartvigsen is a Managing Director at Ankura with more than 30 years of experience in information technology, including responding to and mitigating threats to intellectual property, management of information compromise events, pursuit of nation-state intelligence entities, and prosecution of cyber threat actors. He is based in Washington, D.C.
Prior to joining Ankura, Daron was a special agent in the Air Force Office of Special Investigations, and served as the chief of Cyber Investigations and Operations at AFOSI’s field location near Washington, DC. He performed as a trusted advisor to senior Air Force, Department of Defense, Homeland Security, intelligence, and industry leaders on matters of incident response, intrusion investigations, threat pursuit, computer forensics, intelligence collection, risk management, and cyber threat analysis. His unit’s work was recognized by the DoD when his unit was selected as the top counterintelligence technologies team of the year for both 2015 and 2016. Daron’s AFOSI career culminated in early December 2017 when his unit’s partnership with the Department of Justice, Pittsburgh Federal Bureau of Investigation, and the Naval Criminal Investigative Service resulted in the indictment of three Chinese nationals for theft of US intellectual property.
From 2010 to 2014, he served at Headquarters AFOSI in the cyber program office, taking over as the cyber program manager in 2012. During this period, Daron and his team transitioned AFOSI’s legacy cyber portfolio from a reactive forensics capability into a force that actively countered risk with three lines of business: cyber operations, insider threat, and field cyber support. Daron and his team organized, trained, equipped, and assessed AFOSI’s global cyber investigative workforce. He was responsible for the implementation of AFOSI’s Insider Threat program and routinely briefed senior leaders in the intelligence community regarding counterintelligence matters.
Prior to 2010, Daron served in several roles, including AFOSI liaison officer to the then-emerging Air Force Cyber Command, cybercrime investigator supporting the Air Force’s Computer Emergency Response Team, and field agent conducting complex intrusion investigations.