Built on Trust. Driven by Intelligence.
GEM Enterprise exists to close the gap between enterprise ambition and operational security reality. We deliver intelligence-grade protection for organizations that cannot afford to be wrong.
Leadership & Vision
Mission, vision, and the values that define how we operate
Our Mission
To provide institutional-grade cybersecurity, financial security, and operational protection to qualified enterprises and accredited clients — enabling them to operate with confidence in an environment of persistent and evolving threats. We exist to be the security partner that organizations depend on when the stakes are highest.
Our Vision
A world where qualified organizations have access to the same caliber of security intelligence and operational expertise historically reserved for national governments and the largest global institutions — delivered with transparency, accountability, and precision. We are building toward a future where enterprise security excellence is not a privilege of scale.
Company Values
Integrity
Every recommendation we make and every engagement we undertake is governed by an unwavering commitment to honesty. We will never recommend a course of action that conflicts with our clients' best interests or that compromises our independence.
Intelligence
We operate from evidence, not assumption. Our analysts, advisors, and engineers are trained to think adversarially — anticipating threats before they materialize and grounding every decision in rigorous, current analysis of the threat landscape.
Independence
GEM Enterprise is not a reseller or affiliate of any technology vendor. Our assessments and recommendations are entirely free from commercial incentives. What we advise is what we genuinely believe is correct for your organization.
Accountability
We stand behind every assessment, recommendation, and action. Our engagement structures include defined SLAs, formal deliverables, and named advisors — because accountability is not optional when organizations depend on us to be right.
Executive Board
The leadership team guiding GEM Enterprise
Alexander Mercer
Chief Executive Officer
A veteran of enterprise risk and institutional finance with over two decades navigating global markets, regulatory environments, and high-stakes security operations. Mercer founded GEM Enterprise with a mandate to deliver intelligence-grade security at institutional scale, drawing on prior leadership roles at a major sovereign wealth fund and a Big Four advisory practice.
Dr. Samira Okonkwo
Chief Security Officer
Former lead of a national-level cyber threat intelligence unit with deep expertise in advanced persistent threats, critical infrastructure protection, and zero-trust architecture. Dr. Okonkwo holds a doctorate in information systems security and has testified before regulatory bodies on enterprise cybersecurity standards.
Marcus Thornton
Chief Financial Officer
A seasoned financial executive with institutional investment banking, fund administration, and multi-jurisdictional regulatory compliance experience spanning over 18 years. Thornton leads GEM's financial operations and oversees client asset protection frameworks with prior tenures at a Tier 1 investment bank and a leading asset management firm.
Catherine Voss, Esq.
General Counsel & Chief Compliance Officer
An accomplished attorney specializing in data privacy law, regulatory enforcement, and corporate governance across financial services and technology sectors. Voss provides legal oversight for all client engagements, compliance programs, and GEM's operational policies across multiple jurisdictions, including prior service as Deputy General Counsel at a global financial institution.
Team Divisions
Six specialized divisions delivering enterprise excellence
Cybersecurity Division
Our core security team operates the GEM Security Operations Center and delivers threat intelligence, incident response, penetration testing, and security architecture services to enterprise clients globally. This division maintains 24/7 operational coverage across all client environments.
Capabilities
- SOC Operations
- Threat Intelligence
- Red Team
- Digital Forensics
Intelligence Division
A specialized unit focused on open-source intelligence, dark web monitoring, geopolitical risk analysis, and adversary profiling. The Intelligence Division informs proactive defense decisions across all client engagements and contributes to GEM's proprietary threat intelligence feeds.
Capabilities
- OSINT Operations
- Dark Web Monitoring
- Adversary Profiling
- Geopolitical Risk
Financial Security Division
Specialists in financial institution security, fraud prevention, AML compliance, and regulatory risk. This division protects client financial operations, supports risk quantification and regulatory reporting, and coordinates with forensic accounting partners on complex investigations.
Capabilities
- Transaction Security
- Fraud Prevention
- AML Compliance
- Financial Forensics
Real Estate Division
Security advisors focused on property and transaction protection. This team secures real estate investment platforms, property management systems, and closing processes. The division maintains integrations with major county recorder databases for real-time deed monitoring.
Capabilities
- Property Security
- Title Monitoring
- Closing Protection
- Portfolio Management
Operations Division
The operational backbone of GEM Enterprise. This team manages client onboarding, platform infrastructure, internal security, vendor relationships, and organizational resilience programs. Operations ensures consistent service delivery and SLA adherence across all engagements.
Capabilities
- Client Onboarding
- Platform Operations
- Vendor Management
- Business Continuity
Compliance Division
In-house legal and compliance professionals ensuring GEM operates within applicable regulatory frameworks and that client engagements adhere to the highest standards of legal and ethical practice. This division manages KYC/AML screening, regulatory filings, and client compliance advisory.
Capabilities
- Regulatory Compliance
- KYC/AML Oversight
- Data Privacy
- Audit Support
Partners & Trustees
Strategic alliances and institutional relationships that strengthen our capabilities
National Cybersecurity Alliance
Strategic membership providing access to coordinated threat intelligence sharing, policy advocacy, and best-practice frameworks for enterprise security programs.
Financial Services Information Sharing and Analysis Center (FS-ISAC)
Participation in the global financial sector's primary threat intelligence sharing network, enabling real-time correlation of financial sector-specific threats.
American Land Title Association (ALTA)
Affiliation with the national association for title insurance and settlement services, supporting GEM's real estate security standards and title fraud prevention programs.
ISACA — Information Systems Audit and Control Association
Organizational membership supporting GEM's commitment to internationally recognized IT governance, audit, and security standards across all client engagements.
Association of Certified Fraud Examiners (ACFE)
Partnership supporting GEM's financial forensics capabilities and professional development standards for fraud examination and financial crime investigation.
Cloud Security Alliance (CSA)
Contributing membership to the global standards body defining cloud security best practices, informing GEM's cloud security assessment frameworks and client advisory services.
Confidential trustee and institutional partner identities are disclosed to clients under NDA during the onboarding process. GEM Enterprise does not publicly disclose specific financial custodian or institutional relationships without written authorization.
Compliance & Regulatory Disclosure
GEM Enterprise operates under applicable federal and state regulations. All client engagements are subject to eligibility review, KYC/AML screening, and jurisdictional compliance requirements. Our services are available to qualified institutions and accredited individuals only. Review our full compliance notice for complete regulatory disclosures.