Advisory Services

Over my career I've worked to offer tailored cybersecurity expertise to help organizations build, improve, and operationalize their security program. From compliance, to building out risk management functions and executive-level advisory, I'm experienced in providing actionable guidance backed by industry standards and experience.

Control Maturity

Helping organizations develop a clear understanding of where they stand against top security frameworks. I've worked to identify gaps, prioritize remediation efforts, and help organizations move confidently toward compliance or certification

Control Maturity

“How strong and effective are the controls we already have?”

  • Assessing how well current security controls are designed, implemented, and maintained

  • Scoring controls using a maturity model (e.g., 1–5 scale) based on process, automation, and consistency

  • Identifying areas where controls exist but are weak, inconsistent, or outdated

  • Aligning improvements with your risk tolerance and long-term business goals

Gap Assessments

“Do we have all the required controls in place?”

  • Tailored assessments to security/privacy frameworks

    • ISO 27001, NIST CSF & 800-53, SOC 2, HIPAA, PCI-DSS, and more

  • Readiness assessments for audits or certifications

    • Identify missing or incomplete controls needed for certification or attestation

  • Tailored action plans based on maturity and risk

3rd Party Risk Management

Managing and mitigating risks from vendors, suppliers, and partners—both inbound and outbound

man walking on string over the hill during daytime
man walking on string over the hill during daytime
Vendor Due Diligence
  • Performing initial and ongoing risk reviews of third parties

  • Creating and customizing standard questionnaires (SIG, CAIQ, custom)

Contract and SLA Risk Review
  • Analyzing vendor contracts for data protection, breach response, and liabilities

  • Aligning terms with internal security requirements

  • Recommending changes to ensure enforceability and clarity

TPRM Program Development
  • Designing and operationalizing a complete TPRM function

  • Advising on tooling and workflow automation

Policy Development

Building policies that work in the real world, not just on paper

man writing on paper
man writing on paper
Policy Review and Gap Analysis
  • Reviewing current documentation for completeness and alignment

  • Mapping policies to applicable frameworks (SOC 2, ISO, HIPAA, etc.)

  • Recommending updates for clarity, enforcement, and effectiveness

Policy Creation and Customization
  • Developing security policies tailored to your environment and risk profile

  • Including guidance for versioning, ownership, and approval

Employee-Facing Documentation
  • Creating Acceptable Use, Remote Work, and Awareness policies

  • Writing in plain language for non-technical audiences

Risk Assessments

Understanding the risk landscape and helping organization make informed, prioritized decisions

two dices stacked on top of each other on a red surface
two dices stacked on top of each other on a red surface
Enterprise Risk
  • Identifying and evaluate security, compliance, and operational risks across your organization

  • Mapping risks to business impact, likelihood, and existing control coverage

  • Prioritizing mitigation efforts based on severity and alignment with risk appetite

  • Aligning risk programs with industry standards like NIST RMF, ISO 27005, or FAIR methodology

  • Supporting internal risk registers, compliance initiatives, or board reporting

  • Tailoring programs for enterprise-wide reviews, targeted systems, or specific initiatives (e.g., cloud migration)

And more...

Providing flexible, ongoing advisory services to support organizations' security and compliance goals

CISO Services
Incident Response Preparedness

Building, testing, and refining incident response programs to ensure organizations are prepared when it matters most