Blog

Cultivate & Motivate

Learnings, teachings and tips & tricks for anyone to reference or review. All questions welcomed; no conversation is too big or too small.

Is Our Critical Infrastructure on the Verge of a Security Crisis?
Tara Lemieux Tara Lemieux

Is Our Critical Infrastructure on the Verge of a Security Crisis?

Consider a scenario where a nation-state adversary successfully infiltrates the control systems of a major power grid. With malicious intent, they could manipulate the distribution of electricity, causing widespread blackouts and chaos. The impacts would ripple through hospitals, transportation networks, and financial institutions, plunging the nation into darkness and bringing life as we know it to a standstill. The mere thought of such a scenario underscores the urgency of the challenges we face.

Read More
Mastering the Matrix: Unleashing the Power of 'Once Done, Map to Many' in Cybersecurity Compliance
Tara Lemieux Tara Lemieux

Mastering the Matrix: Unleashing the Power of 'Once Done, Map to Many' in Cybersecurity Compliance

I'll bet you're frustrated to hear "yet another cybersecurity assessment requirement" is impacting your business. A fair sentiment, considering the mounting responsibilities placed on organizations in an increasingly digital and data-driven world. Often it feels like you're reinventing the wheel, ensuring compliance to a myriad of regulations and standards, with limited resources, high uncertainty, and a seemingly redundant pattern of effort.

Read More
Zen and the Art of Representative Sampling
Tara Lemieux Tara Lemieux

Zen and the Art of Representative Sampling

Sampling is an indispensable part of a cybersecurity audit. It's the method by which auditors select a subset of the overall audit scope, such as certain data, systems, or processes for in-depth review. While sampling is addressed in some industry standards like ISO 19011:2018, its application in a cybersecurity context requires a unique approach. This guide aims to define the concept of sampling in cybersecurity audits and provide specific criteria for auditors.

Read More
Your VPN Gateway: Secure Passage or Trojan Horse?
Tara Lemieux Tara Lemieux

Your VPN Gateway: Secure Passage or Trojan Horse?

Imagine you're Sarah, a defense contractor analyst for a large corporation, connecting from a hotel's Wi-Fi network. You're conscientious about security, so you use your VPN to work on documents that contain Controlled Unclassified Information (CUI). But what if, unknowingly, your VPN connection drops? Your device, oblivious to this change, continues to send and receive data over the unprotected hotel network. Suddenly, your secure document isn't so secure.

Read More
Can AI Instances Dream?
Tara Lemieux Tara Lemieux

Can AI Instances Dream?

From the realms of science fiction, the prospect of sentient machines has crossed the boundary into the cold, hard light of reality. We're standing on the precipice of a new age, teetering on the edge of a Twilight Zone-esque possibility: Could our computers, through some unprecedented occurrence, become sentient?

Read More
The Cybersecurity Conundrum: Are Executives Looking Through the Wrong End of the Telescope?
Tara Lemieux Tara Lemieux

The Cybersecurity Conundrum: Are Executives Looking Through the Wrong End of the Telescope?

In an era of sophisticated cyber threats, business leaders face a daunting challenge: maintaining cybersecurity compliance while simultaneously establishing a robust and scalable cyber resilient architecture. However, some executives may be approaching this challenge from the wrong perspective, overly fixated on ever-changing federal regulations and neglecting the fundamental task of building a comprehensive cybersecurity infrastructure.

Read More
Strange But True: Unbelievable Cybersecurity Stories from the United States
Tara Lemieux Tara Lemieux

Strange But True: Unbelievable Cybersecurity Stories from the United States

The world of cybersecurity is replete with bizarre and eye-opening tales that seem straight out of a Hollywood script. But as they say, truth is often stranger than fiction. As we strive to stay ahead in the cyber race, let's delve into some truly fascinating, but equally strange cybersecurity stories from the United States that shed light on the dangers of this shifting digital landscape.

Read More
Raising the Cybersecurity Bar: Unpacking the NIST 800-171 rev 3 and its Implications on the Defense Supply Chain
Tara Lemieux Tara Lemieux

Raising the Cybersecurity Bar: Unpacking the NIST 800-171 rev 3 and its Implications on the Defense Supply Chain

In an era of escalating digital threats, robust cybersecurity measures are critical, particularly for the defense supply chain that underpins national security. The latest release of the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171 revision 3 accentuates this need, prompting a call to action for a more aggressive cybersecurity stance within our defense supply chain.

Read More
A House, Divided
Tara Lemieux Tara Lemieux

A House, Divided

In the midst of the ongoing conflict between Ukraine and Russia, a new front has emerged - one that is equally dangerous but much less visible. It is the war in cyberspace, where Russia's President Vladimir Putin has been waging an aggressive campaign against the United States and its allies. This cyber war is not only a threat to our national security, but also to our critical infrastructure, emergency services, and warfighters on the front line.

Read More

Start your journey

What’s stopping you from connecting with a resource that can and will help your organization successfully and efficiently navigate the compliance quagmire.? Go on, pick up the phone - it really is that easy.