<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Home on Source Cyber Solutions | Cybersecurity &amp; Privacy Consulting</title><link>https://sourcecybersolutions.com/</link><description>Recent content in Home on Source Cyber Solutions | Cybersecurity &amp; Privacy Consulting</description><generator>Hugo</generator><language>en-US</language><lastBuildDate>Wed, 29 Apr 2026 10:24:52 -0400</lastBuildDate><atom:link href="https://sourcecybersolutions.com/index.xml" rel="self" type="application/rss+xml"/><item><title>Get in Touch</title><link>https://sourcecybersolutions.com/contact/</link><pubDate>Wed, 29 Apr 2026 10:24:52 -0400</pubDate><guid>https://sourcecybersolutions.com/contact/</guid><description>&lt;h2 id="ready-to-strengthen-your-security"&gt;Ready to Strengthen Your Security?&lt;/h2&gt;
&lt;p&gt;I am currently accepting new clients. Let&amp;rsquo;s discuss how Source Cyber Solutions can help protect your organization.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id="schedule-a-strategy-session"&gt;Schedule a Strategy Session&lt;/h2&gt;
&lt;p&gt;Book a complimentary 30-minute call to discuss your challenges and see if we&amp;rsquo;re a good fit. No pressure, no commitment.&lt;/p&gt;
&lt;a href="https://calendar.proton.me/bookings#7i0YZwkaJUxve_uDx8BWuq0ZYXHHGLS7FTaU6q7hL0A=" class="booking-button"&gt;📅 Book a Strategy Session&lt;/a&gt;
&lt;hr&gt;
&lt;h2 id="send-an-email"&gt;Send an Email&lt;/h2&gt;
&lt;p&gt;For general inquiries, RFPs, or if you prefer email:&lt;/p&gt;
&lt;p&gt;📧 &lt;a href="mailto:inquiries@sourcecybersolutions.com"&gt;inquiries@sourcecybersolutions.com&lt;/a&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id="what-to-expect"&gt;What to Expect&lt;/h2&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th style="text-align: left"&gt;Step&lt;/th&gt;
&lt;th style="text-align: left"&gt;Details&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: left"&gt;&lt;strong&gt;Response Time&lt;/strong&gt;&lt;/td&gt;
&lt;td style="text-align: left"&gt;Within 24–48 hours on business days&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: left"&gt;&lt;strong&gt;Confidentiality&lt;/strong&gt;&lt;/td&gt;
&lt;td style="text-align: left"&gt;All communications are handled with strict confidentiality&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: left"&gt;&lt;strong&gt;No Obligation&lt;/strong&gt;&lt;/td&gt;
&lt;td style="text-align: left"&gt;Strategy Sessions are free and carry no commitment&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h2 id="location"&gt;Location&lt;/h2&gt;
&lt;p&gt;I work remotely with clients globally. For local engagements, I&amp;rsquo;m based in &lt;strong&gt;Cumming, GA&lt;/strong&gt;.&lt;/p&gt;</description></item><item><title>Privacy Policy</title><link>https://sourcecybersolutions.com/privacy/</link><pubDate>Wed, 29 Apr 2026 10:24:32 -0400</pubDate><guid>https://sourcecybersolutions.com/privacy/</guid><description>&lt;p&gt;&lt;strong&gt;Last Updated:&lt;/strong&gt; May 14, 2026&lt;/p&gt;
&lt;h2 id="1-introduction"&gt;1. Introduction&lt;/h2&gt;
&lt;p&gt;This Privacy Policy explains how &lt;strong&gt;Source Cyber Solutions, LLC&lt;/strong&gt; (&amp;ldquo;we,&amp;rdquo; &amp;ldquo;us,&amp;rdquo; or &amp;ldquo;our&amp;rdquo;) handles information when you visit our website at &lt;a href="https://sourcecybersolutions.com"&gt;sourcecybersolutions.com&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id="2-information-we-collect"&gt;2. Information We Collect&lt;/h2&gt;
&lt;h3 id="automatically-generated-data"&gt;Automatically Generated Data&lt;/h3&gt;
&lt;p&gt;Our web server (Nginx) generates standard access logs as part of normal operation. These logs may include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;IP addresses.&lt;/li&gt;
&lt;li&gt;Browser type and version.&lt;/li&gt;
&lt;li&gt;Operating system.&lt;/li&gt;
&lt;li&gt;Timestamps of visits.&lt;/li&gt;
&lt;li&gt;Pages requested.&lt;/li&gt;
&lt;li&gt;Referrer data (the website you came from, if any).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These logs are generated automatically by the server for operational and security purposes. We do not use analytics tools, advertising trackers, or any third-party data collection services.&lt;/p&gt;</description></item><item><title>Consulting Services</title><link>https://sourcecybersolutions.com/services/</link><pubDate>Tue, 21 Apr 2026 20:54:12 -0400</pubDate><guid>https://sourcecybersolutions.com/services/</guid><description>&lt;h2 id="tailored-grc-solutions-for-healthcare-energy-and-enterprise"&gt;Tailored GRC Solutions for Healthcare, Energy, and Enterprise&lt;/h2&gt;
&lt;p&gt;I offer flexible engagement models designed to meet your organization&amp;rsquo;s specific needs. All services are delivered with a focus on actionable outcomes, not just theoretical compliance.&lt;/p&gt;
&lt;hr&gt;
&lt;h3 id="1-targeted-risk-assessment"&gt;1. Targeted Risk Assessment&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Duration:&lt;/strong&gt; 3 Weeks | &lt;strong&gt;Investment:&lt;/strong&gt; Contact for Quote&lt;/p&gt;
&lt;p&gt;A focused assessment of your current security posture, identifying your biggest risks and providing a clear roadmap to address them.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What You Get:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Discovery:&lt;/strong&gt; Review of questionnaires and interviews with key staff.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Gap Analysis:&lt;/strong&gt; Evaluation against NIST CSF or CIS Controls.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Risk Report:&lt;/strong&gt; Formal document with Executive Summary, findings, and prioritized remediation steps.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Presentation:&lt;/strong&gt; 60-minute walkthrough of results.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Best For:&lt;/strong&gt; Organizations needing a baseline assessment or preparing for an audit.&lt;/p&gt;</description></item><item><title>About Alex Goodman</title><link>https://sourcecybersolutions.com/about/</link><pubDate>Tue, 21 Apr 2026 20:53:49 -0400</pubDate><guid>https://sourcecybersolutions.com/about/</guid><description>&lt;h2 id="principal-consultant--cissp"&gt;Principal Consultant | CISSP&lt;/h2&gt;
&lt;p&gt;With over &lt;strong&gt;15 years of experience&lt;/strong&gt; in Governance, Risk, and Compliance (GRC), I help organizations protect their most critical assets while meeting regulatory and business requirements. My approach is straightforward: cut through the jargon, focus on what matters, and deliver security programs that actually work.&lt;/p&gt;
&lt;h3 id="areas-of-depth"&gt;Areas of Depth&lt;/h3&gt;
&lt;p&gt;While I serve clients across industries, my deepest experience lies in:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Healthcare:&lt;/strong&gt; HIPAA, HITECH, patient data privacy, and electronic health record security.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Energy &amp;amp; Utilities:&lt;/strong&gt; NERC CIP and critical infrastructure protection.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;These are high-stakes environments where security failures have real-world consequences. That perspective shapes how I approach every engagement, regardless of industry.&lt;/p&gt;</description></item><item><title>Ethos</title><link>https://sourcecybersolutions.com/ethos/</link><pubDate>Tue, 21 Apr 2026 20:53:49 -0400</pubDate><guid>https://sourcecybersolutions.com/ethos/</guid><description>&lt;h2 id="principles-that-guide-my-work"&gt;Principles That Guide My Work&lt;/h2&gt;
&lt;p&gt;At Source Cyber Solutions, I believe that cybersecurity is not just a technical discipline; it is an ethical imperative. Every risk assessment, every policy, and every recommendation carries real-world implementation implications and consequences for real people.&lt;/p&gt;
&lt;p&gt;Here are the principles that define how I work.&lt;/p&gt;
&lt;hr&gt;
&lt;h3 id="1-human-judgment-over-ai-automation"&gt;1. Human Judgment Over AI Automation&lt;/h3&gt;
&lt;p&gt;Artificial Intelligence is a powerful tool, but it lacks the intuition, context, and lived experience required to navigate complex, unique business environments. AI cannot detect the subtle nuances of a flawed control implementation or the hidden risks in a specific organizational culture.&lt;/p&gt;</description></item></channel></rss>