Former Apple CSO & CCO · Silicon Valley

We built security and compliance programs
enterprises and governments trust.
Now advising you.

7 Elm Strategies delivers board-grade advisory at the intersection of security and compliance — drawing on 20 years as Apple's Chief Security Officer and Chief Compliance Officer, a dual mandate held by no executive at this scale.

20
Years as Apple CSO/CCO
1,000+
Confidential investigations
$200M+
Recovered from IP theft
24/7/365
Datacenter & Critical Infrastructure Operations
$500M
Annual security budget managed at Apple across 150+ countries
Zero
Prototype losses — reduced from 35,000 annually through supplier security transformation
500M+
Critical components protected across 100+ global supplier sites
J.D.
UC Hastings Law · UC Berkeley · U.S. Navy Intelligence Specialist
Thomas O. Moyer
Thomas O. Moyer · Founder & Principal
Connect on LinkedIn
About

Thomas O. Moyer

Founder & Principal

Thomas Moyer spent 20 years as Chief Security Officer and Chief Compliance Officer at Apple — building and scaling a world-class global security organization from 35 people to more than 650 professionals, managing a $500M annual budget across operations in 150+ countries. Holding both seats simultaneously is uncommon at Apple's scale, and reflects the increasingly inseparable nature of security and compliance in modern enterprise risk. That footprint included Apple's global datacenter and critical infrastructure operations — where physical security, insider access control, and supply chain integrity converge at the highest stakes.

He briefed Apple's Board of Directors on enterprise risk. He personally led insider threat investigations that resulted in federal prosecutions.

Over a career spanning HR law, compliance leadership, and global security operations, Tom has led or supervised more than 1,000 investigations — covering ethics violations, organized crime, insider threats, cyber incidents, supply chain infiltration, corporate espionage, retail loss prevention, and leak investigations. As CCO, he reported on business conduct investigations directly to Apple's Audit Committee.

He is also a licensed attorney and the founder of two AI ventures. That combination — operator, lawyer, builder — is what makes 7 Elm Strategies genuinely different. Tom has sat on the buyer's side of every enterprise security decision. He knows exactly what enterprises require, and he brings that lens to every engagement.

All engagements are principal-led and conducted in strict confidence.

  • Founded Apple's Global Compliance Program as Chief Compliance Officer · Reported directly to Audit Committee on ethics, governance, and enterprise risk
  • J.D., UC Hastings College of the Law · Senior Editor, Hastings Law Journal
  • B.A., UC Berkeley · Phi Beta Kappa · Graduated with Highest Distinction
  • U.S. Navy Intelligence Specialist · Top-Secret clearance
  • Founder, Talk2Me Inc. · Founder, Art Prism Inc.
  • FBI DSAC · State Department OSAC · FBI InfraGard · ISMA
Strategic Advisor

Intelligence-grade
insider threat expertise

 

7 Elm Strategies engages Anthony DeMario as Strategic Advisor on insider threat, corporate espionage, and intelligence-sensitive matters. Together, Tom and Tony represent a pairing available nowhere else in the advisory market.

Tony spent over 35 years in the U.S. Intelligence Community and U.S. Military, including as a Senior Executive at the CIA where he led operations focused on counterterrorism and the Middle East. He then joined Apple, where he architected the company's industry-recognized Insider Threat and Corporate Espionage program — the same program that reduced prototype loss to zero and recovered over $200M in damages.

He currently serves as Strategic Advisor to Advanced Archer Technologies, an international drone consulting company, and is an advisor to Presage Global.

Anthony DeMario
Anthony DeMario · Strategic Advisor
Connect on LinkedIn
Strategic Advisor
Anthony DeMario
Former CIA Senior Executive · Apple Insider Threat Program Architect
  • 34+ years, U.S. Intelligence Community & Military
  • CIA Senior Executive — Middle East, Iran and Counterterrorism
  • Architect, Apple Insider Threat & Corporate Espionage Program
  • Expertise in nation-state IP theft and supply chain risk
  • Executive Vice President, Strider Technologies
  • Strategic Advisor, Advanced Archer Technologies
  • Advisor, Presage Global
Services

Where the
Apple lens changes everything

Each vertical draws on what Tom Moyer actually built, ran, and protected at Apple. Not generic consulting frameworks repackaged as strategy — real experience, applied directly to your specific problem.

01
Enterprise Security & Compliance Advisory

Board-credible counsel for enterprises where security and compliance can no longer be run as separate functions. Tom held both the CSO and CCO seats at Apple and briefed the Audit Committee on enterprise risk for over a decade. He brings the rigor of both disciplines — and the standards behind them — to your organization.

Board BriefingsM&A Due DiligencePhysical Security ArchitectureCrisis ManagementCompliance Program DesignVendor Security
02
Startup Go-to-Market & Enterprise Readiness

Tom Moyer spent 20 years on the other side of your enterprise sales process — deciding which vendors Apple trusted and which ones failed review. He now tells founders exactly why deals stall, and how to fix it.

Enterprise GTM StrategySecurity-by-DesignFractional CISOEnterprise Sales CoachingInvestor ReadinessSOC 2 / Trust Posture
03
Insider Threat & Corporate Espionage

The most defensible offering in the market. Tom Moyer and Tony DeMario built, ran, and continuously refined Apple's insider threat program — reducing prototype loss to zero and recovering $200M+ in damages. That program can be adapted for your organization.

Program DesignAI Detection ArchitectureSupply Chain SecurityFederal Agency LiaisonNation-State ThreatInvestigations Support
04
Datacenter & Critical Infrastructure Security

AI infrastructure, hyperscaler operations, and colocation facilities face a convergence of threats most security programs aren't built for: nation-state interest in compute capacity, insider access to high-value hardware, supply chain infiltration at the component level, and physical security demands that scale with gigawatts. Tom oversaw security for Apple's global datacenter and infrastructure footprint and brings that operating experience — not a framework — to operators, investors, and AI companies building the next generation of compute.

Site Security ArchitecturePersonnel & Access ProgramsSupply Chain IntegrityNation-State Threat AssessmentM&A Diligence for Datacenter AssetsHyperscaler & AI Infrastructure Advisory
Marquee Capability

The insider threat
no one else can address

Most enterprises have policies. Few have programs that actually work. The gap between the two is where IP is lost, where state-sponsored theft succeeds, and where a single incident becomes a regulatory, reputational, and board-level crisis.

Modern insider threat programs don't sit inside security alone — they require tight integration of security, compliance, HR, and legal. Tom built that integration at Apple as both CSO and CCO, reporting on business conduct directly to the Audit Committee. That dual perspective is the difference between a program that detects and a program that defends.

7 Elm Strategies brings the only advisory team that designed and operated Apple's insider threat program from the ground up — with CIA-level analytical methodology and a track record of federal prosecutions.

Proven at Apple Scale
35,000 → 0prototype losses annually after program implementation
$200M+recovered in damages from theft and confidentiality breaches
500M+critical components protected annually
Multiple federal prosecutionsin collaboration with FBI and DOJ

Why boards are paying attention now

A material insider incident is no longer just a loss event — it's a disclosure question, a regulatory question, and a reputational one. In today's geopolitical and enforcement environment, enterprises are under pressure to demonstrate, credibly, that they have nation-state and supply-chain risk under control. We help you build a program you can stand behind in front of regulators, customers, and your own board.

Program Capabilities

  • End-to-end insider threat program evaluation, design, or redesign
  • IP theft risk assessment — nation-state & competitor threat
  • Supply chain infiltration defense and checkpoint management
  • HR-Legal-Security integration and investigation protocols
  • Federal agency collaboration support (FBI, DOJ, IC)
  • Post-incident investigation support and evidence preservation
  • Classified and CUI environment advisory
  • Reputational and regulatory risk preparedness — board, regulator, and customer-facing defensibility
Request a Confidential Conversation

Engagements in this area are strictly confidential and principal-led.

How We Work

How we work together

Principal-led. Limited engagements. Designed for executives and founders who need real decisions, not presentations.

No 500-page decks that sit on a shelf. Every engagement produces decisions you can act on immediately — built around your organization, not a recycled framework.

2 Weeks
Diagnostic & Roadmap

A rapid, focused assessment that tells you exactly where your highest risks are and what to do about them first. Designed for organizations that need clarity before committing to a larger engagement.

  • Executive interviews and targeted document review
  • Priority risk register with quick-win identification
  • Recommended roadmap and decision paths
Typically 2 Weeks · Fixed Fee
Most Common
3 Months
90-Day Transformation

A board-ready operating model with measurable improvements in security posture, defensibility, and organizational readiness. The most common starting point for new clients.

  • Full risk register and prioritization framework
  • Operating model redesign and 90-day execution plan
  • Executive review sessions and board-ready deliverables
  • For startups: enterprise sales readiness assessment included
Typically 3 Months · Cash or Equity
Ongoing
Ongoing Strategic Counsel

Tom or Tony as your senior advisor on retainer — available for board prep, high-stakes decisions, crisis response, and ongoing program oversight. Available for cash or equity.

  • Monthly executive cadence and board prep
  • Rapid-response counsel for emerging threats
  • Ongoing oversight and program development
Ongoing · Monthly Retainer · Cash or Equity
Contact

The conversation
is confidential

Whether you are a board preparing for regulatory scrutiny, a founder trying to win your first enterprise deal, or an organization that suspects an insider threat — the first conversation costs nothing and discloses nothing.

contact@7elmstrategies.com
San Francisco Bay Area
All inquiries are confidential
Cash & equity engagements welcomed