Governance
- Data governance frameworks
- Policy creation aligned with business goals
- Accountability and roles/responsibilities
- Strategic oversight
Risk Management
- Vulnerability assessments
- Threat identification and prioritization
- Technical safeguards (firewalls, MFA, encryption, VPNs)
- Incident response planning
- Proactive threat hunting
- Attack vector identification
Compliance
- Meet regulatory requirements (GDPR, HIPAA, PCI DSS)
- Audits and monitoring
- Documentation and reporting
- Employee training specific to compliance
- Keeping up with changing regulations
About Cyber Edge
After decades in technology and information security, I founded Cyber Edge to bring enterprise-grade cybersecurity expertise to the organizations that need it most.
With over 15 years leading information security initiatives across financial services, insurance, healthcare, and critical infrastructure, I've helped organizations navigate complex regulatory frameworks.
Now, I'm focused on bringing that same level of strategic protection to small and mid-sized businesses, healthcare organizations, financial services firms, and e-commerce companies—organizations that face the same sophisticated cyber threats as large enterprises but often lack dedicated security leadership.
Whether your business is just starting out or has been operating for decades, you deserve protection that goes beyond basic firewalls.
-Van
Frequently Asked Questions about Cybersecurity
CE can conduct end-to-end risk and compliance evaluations across SaaS, Azure, AWS, and on-prem environments to ensure every system aligns with industry regulations such as NYDFS, NIST, and APRA. This includes reviewing and approving architecture designs, firewall changes, and infrastructure updates before they go live.
By applying a Secure by Design approach, I identify gaps early and provide practical mitigation strategies so your technology remains both compliant and resilient. This process has helped organizations streamline approvals—reducing architecture review timelines by up to 30%.
I lead audit-readiness efforts for both internal and external assessments, ensuring teams understand requirements and all remediation work is tracked to completion.
Beyond audit preparation, I support CISOs by driving firm-wide governance initiatives—maintaining proper zoning and network segmentation, updating security policies, and translating complex technical risks into clear business insights for stakeholders.
This governance-focused approach strengthens organizational alignment and keeps security programs operating at a high level of maturity.
I act as a liaison between the security organization and cross-functional teams—such as IT, engineering, operations, and business leadership. My role is to translate complex security findings into clear, actionable business terms so teams understand both the risks and the business impact.
Early stakeholder alignment helps organizations move faster, make smarter decisions, and keep security working in service of the business.