"Building a cybersecurity mindset. One community, one step at a time."
The Community Consultant LLC
Mission
The Community Consultant's mission is to empower individuals and businesses with technology by educating and guiding them on how to enhance their visibility while safeguarding their data, privacy, and information systems.
The Community Consultant is passionate about ensuring that its clients succeed in the digital world with confidence and security. Building a cybersecurity mindset, one individual and one business at a time.
Values
At the core of the business lies a steadfast commitment to integrity, ethics, and responsibility, guiding every decision we make. The Community Consultant values respect and accountability, fostering an environment where honest and transparent communication thrives. Our focus on innovation and discipline drives continuous improvement, while empathy and education empower us to understand and meet the diverse needs of those we serve. Together, these values shape a purpose-driven organization dedicated to excellence and positive impact.
Continuous Education Resources
Our Services
Bringing Women in Cybersecurity (WiCyS) Events to the Upper Peninsula of Michigan
As the WiCyS Upper Peninsula Area Coordinator, let's bridge the gap between the Upper Peninsula of Michigan and the Lower Peninsula by bringing Women in Cybersecurity (WiCyS) events to the #906. All we need is a classroom or meeting space to hold an event in your organization, school, community college and/or university.
Do you have a classroom or meeting space that we can book at your facility? Benefits of WiCyS | Join WiCyS Michigan for Free! | Join WiCyS Global
Compliance | Laws | Rules | Regulations | Best Practices
Confidentiality, Integrity, and Availability. How confident is your business when it comes to protecting your information and information system assets? Are you confident that your information is kept confidential, has integrity, and is available to the right people? Does your business have controls put in place to protect these assets?
Protecting business information assets must be driven from the C-Suite and stakeholders down. It must not be done from the bottom up. Cybersecurity is not the same as Information Security and cybersecurity policies are not developed in your IT Department. Governance starts at the top of the organization e.g., c-suite, board members, and/or stakeholders.
Are you a government contractor? If yes, you are required to protect your information assets in accordance with the National Institute of Standards and Technology (NIST) 800-53 framework and NIST SP 800-171.
Does your organization work within the Defense Industrial Base (DIB)? Are you a subcontractor to the Department of Defense (DoD)? Does your contract specify DFARS Clause 252.204-7012? Are you familiar with the Cybersecurity Maturity Model Certification (CMMC)? Do you need guidance on CMMC?
CMMC | FIPS | FISMA | ISO | NIST
Cybersecurity Audit and/or Risk Assessments
The Community Consultant has 18+ years in conducting quality management, information security, and compliance audits.
What does your risk appetite look like? Let us help you, contact us today!
Federal Information Processing Standards (FIPS)
Industrial Security, Government Contractors
International Automotive Task Force (IATF) standard 16949
ISO 9000 Series
ISO 12207 Software Lifecycle Processes
ISO 27001 Information Security Management
ITAR/EAR Compliance Auditing, Government Contractors
National Institute of Standards and Technology (NIST) SP 800 Series
Risk Management Framework (RMF) and Supply Chain Risk Management (SCRM)
Cybersecurity Awareness & Training
The Community Consultant, LLC provides cybersecurity awareness and training to individuals and/or organizations by embedding the "human" factor. Set up an appointment with us to provide training at your facility and/or provide training one-on-one. Contact us to learn more.
Michigan CyberPatriot Program (Grades: K-12) | Upper Peninsula of Michigan
Michigan CyberPatriot program is available to kindergarten through 12th grade (K-12). It is never too early to start implementing cybersecurity into your daily routine.
CyberPatriot is The National Youth Cyber Education Program that is part of the science, technology, engineering and mathematics (STEM) program of the Air and Space Forces Association (AFA). Source: USCyberPatriot.org
Upper Michigan let's compete in the CyberPatriot Program. Ask your teacher for permission and let's get started today!
Newsletters | Policy | Standard Operating Procedure | Technical Manuals | Web Content
Do you need guidance on how to write your policies and procedures to support your business goals? Policies and procedures are developed to guide your employees, mission (values), and protect your assets (technology and information). Policies and procedures generate audit trails, provide accountability and support governance (strategically). Do you or your organization need help developing, writing, or reviewing a policy and/or procedure?
Newsletters, policies, procedures, technical manuals, and/or web content. Contact us for your editing, reviewing, and/or writing needs today.