top of page


Karen Williams
Jul 9, 20243 min read
Prioritizing Cybersecurity Policies: Building a Strong Foundation
In an era where cyber threats are constantly evolving, organizations must prioritize cybersecurity to protect their digital assets and...
11 views0 comments


Karen Williams
Apr 18, 20233 min read
Project Management inside Risk Management Framework (RMF)
Risk Management Framework and project management
30 views0 comments


Karen Williams
Apr 12, 20232 min read
System Security Plan (SSP) Keys to Success
In 20 years of building and reviewing SSPs, some of the biggest mistakes I see system owners and/or security professionals make is...
28 views0 comments
bottom of page