About Us

The future of cybersecurity is data-driven.

Introducing Empirical

We’re building a new kind of security platform—driven by modern AI, grounded in real-world telemetry, and designed to make decisions, not just generate alerts. Our first product reimagines Vulnerability Management. It’s early, but the results speak for themselves: less noise, more signal, and radically better prioritization.

Founded in the Midwest

Ed Bellis

CEO

+

Ed Bellis was the founder of Kenna Security, a pioneer behind the creation of the Risk-Based Vulnerability Management category. Kenna was acquired by Cisco in 2021, where he lead the Data Science teams for their Threat Detection and Response product portfolio. Before founding Kenna, Ed spent nearly two decades as a hands-on security practitioner, including serving as CISO of Orbitz and holding security roles at organizations such as Bank of America, CSC, and others. In addition to his leadership in cybersecurity, Ed is also a published author. He co-authored Modern Vulnerability Management with Roytman and contributed to the anthology Beautiful Security.

Michael Roytman

CTO

+

Michael was the Chief Data Scientist of Kenna Security, and a Distinguished Engineer at Cisco. He served on boards for the Society of Information Risk Analysts, Cryptomove, and Social Capital. He was the co-founder and executive chair of Dharma Platform (acquired, BAO Systems), for which he landed on the 2017 Forbes 30 Under 30 list. He currently serves on Forbes Technology Council.

Jay Jacobs

Chief Data Scientist

+

Jay is the lead data scientist for the Exploit Prediction Scoring System (EPSS) and is Co-chair of the EPSS special interest group at FIRST. He is a co-founder of the Society for Information Risk Analysts (SIRA), a not-for-profit association dedicated to advancing risk management practices and of Cyentia Institute, a leading security research firm. Jay's book “Data-Driven Security”, covers data analysis and visualizations for information security professionals.

See how your model would differ

Try our models with your own local data and discover their impact on your cybersecurity environment.

Request Demo