Copyright © LLC, Nonprofit, Decorated War Veteran
Signed in as:
filler@godaddy.com
Personalized and Confidential Information Assurance Services for Decision-Makers

Because We Are A Nonprofit Organization, We Can Focus On You, Not Shareholders
Security, Privacy, and Peace of Mind to Ensure Your Success in the Digital World
Cybersecurity: https://www.nist.gov/topics/cybersecurity
The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.

Guide to Operational Technology (OT) Security: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r3.pdf
An Industrial Control System (ICS) is an information system used to control industrial processes such as manufacturing, product handling, production, and distribution or to control critical infrastructure assets.

Assessing Security and Privacy Controls in Information Systems and Organizations: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53Ar5.pdf
An evaluation methodology whereby assessors search for vulnerabilities
and attempt to circumvent the security features of a network and/or
information system.

Digital & Multimedia Evidence: https://www.nist.gov/topics/digital-multimedia-evidence
Digital forensics (also known as cyberforensics) is a branch of forensic science related to the recovery and investigation of artifacts found in digital devices. It includes the processes and specialized techniques for gathering, retaining, and analyzing system-related data (digital evidence) for investigative purposes.

Guide for Applying the Risk Management Framework:
https://csrc.nist.gov/projects/risk-management
The process of identifying, analyzing, assessing, and communicating risk and accepting, avoiding, transferring or controlling it to an acceptable level considering associated costs and benefits of any actions taken.

NIST Cloud Computing Program: https://www.nist.gov/programs-projects/nist-cloud-computing-program-nccp

Framework for Improving Critical Infrastructure Cybersecurity: https://csrc.nist.gov/publications/detail/white-paper/2017/12/05/cybersecurity-framework-v11/draft

Artificial Intelligence:
https://www.nist.gov/artificial-intelligence
Robotics Test Facility: https://www.nist.gov/laboratories/tools-instruments/robotics-test-facility

Security and Privacy Controls: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf

Networks of ‘Things’: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-183.pdf

Cryptography: https://www.nist.gov/topics/cryptography
Tysons Corner, VA
Schedule a Zoom or Brave Talk session (no video required) by emailing allcyber@nym.hush.com
Security and Privacy
Lead Ethical and Administrative Consultant: Michael Hancock
Senior Consultant: WH McLaughlin
Copyright © LLC, Nonprofit, Decorated War Veteran