| CARVIEW |
Sign in to view Ernie’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Ernie’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Anacortes, Washington, United States
Sign in to view Ernie’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
3K followers
500+ connections
Sign in to view Ernie’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Ernie
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Ernie
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Ernie’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Services
Articles by Ernie
-
SEPTEMBER 2023
SEPTEMBER 2023
Welcome to this past month's edition of the 443 Consulting LLC Newsletter. For each month's newsletter I want to offer…
5
-
August 2023Aug 29, 2023
August 2023
Welcome to this month's edition of the 443 Consulting, LLC Newsletter. With this newsletter I want to offer some…
12
4 Comments -
443 News - July 2023Jul 31, 2023
443 News - July 2023
Dear friends of 443 Consulting, We are thrilled to launch our inaugural newsletter, bringing you the latest insights…
18
4 Comments -
The Challenges of Rare EarthsFeb 5, 2023
The Challenges of Rare Earths
In the past few years when doing research and reading on the US critical infrastructure and key resources (CIKR), there…
10
1 Comment -
THE POWER OF OBSERVATIONJan 30, 2023
THE POWER OF OBSERVATION
In my book, Critical Infrastructure Risk Assessment[1], published by Rothstein, Chapter 5 is entitled “The Power of the…
4
1 Comment -
10 Inconvenient Truths About IoT SecurityJan 20, 2020
10 Inconvenient Truths About IoT Security
By Ernie Hayden CISSP CEH GICSP(Gold) PSP -- Founder/Principal 443 Consulting, LLC Internet of Things (IoT) devices are…
15
4 Comments -
To my friend Mike AssanteJun 21, 2019
To my friend Mike Assante
I'd like to personally thank Aaron Turner of CSOOnline for his wonderful and touching article about my dear friend and…
34
3 Comments -
PAY ATTENTION TO THE MICROSOFT “WORMABLE” PATCH FOR WINDOWS XP, 7 AND WINDOWS 2003May 15, 2019
PAY ATTENTION TO THE MICROSOFT “WORMABLE” PATCH FOR WINDOWS XP, 7 AND WINDOWS 2003
I just finished reading Brian Kreb’s posting on Microsoft’s rather unusual action to release security updates and…
10
-
Guiding Parameters for Security Key Performance Indices (KPIs)Dec 7, 2018
Guiding Parameters for Security Key Performance Indices (KPIs)
A while ago I was tasked to work on explaining the concepts of Security KPIs. My immediate thought was to refer to the…
45
1 Comment -
A List: Supply Chain Security ReferencesNov 5, 2018
A List: Supply Chain Security References
For the past two months there has been substantial discussion in the news cycle and professional social networks…
6
1 Comment
Activity
Sign in to view Ernie’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
-
The most successful year of my life started with learning one word: No. I used to think success meant saying yes. More meetings. More…
The most successful year of my life started with learning one word: No. I used to think success meant saying yes. More meetings. More…
Liked by Ernie Hayden
-
If you’ve tried every productivity app, planner, and “hack”… and still feel like you’re sprinting all day with little to show for it— 'Your Time…
If you’ve tried every productivity app, planner, and “hack”… and still feel like you’re sprinting all day with little to show for it— 'Your Time…
Liked by Ernie Hayden
-
If you’re a cybersecurity professional, you’re already protecting data. But here’s the bigger question: are you protecting your company from legal…
If you’re a cybersecurity professional, you’re already protecting data. But here’s the bigger question: are you protecting your company from legal…
Liked by Ernie Hayden
Licenses & Certifications
-
-
-
Certified Information Systems Security Professional (CISSP)
International Information Systems Security Certification Consortium (ISC2)
-
-
Publications
-
Critical Infrastructure Risk Assessment -- The Definitive Threat Identification and Threat Reduction Handbook
Rothstein Publishing
See publicationThis is a handbook for junior and senior personnel alike on what constitutes critical infrastructure and risk and offers guides to the risk assessor on preparation, performance, and documentation of a risk assessment of a complex facility. This is a definite “must read” for consultants, plant managers, corporate risk managers, junior and senior engineers, and university students before they jump into their first technical assignment.
Recommendations received
39 people have recommended Ernie
Join now to viewMore activity by Ernie
-
A useful *general" summary of risks to subsea cables. https://lnkd.in/gSpkzrJ2
A useful *general" summary of risks to subsea cables. https://lnkd.in/gSpkzrJ2
Shared by Ernie Hayden
-
In our new blog post, “Amazon AWS Outage: Why Your Disaster Recovery Plan Probably Won’t Work,” Charlie Maclean-Bristol explains how the recent AWS…
In our new blog post, “Amazon AWS Outage: Why Your Disaster Recovery Plan Probably Won’t Work,” Charlie Maclean-Bristol explains how the recent AWS…
Liked by Ernie Hayden
-
Growth feels risky. Staying the same is riskier. A teacher once told me: "If you're comfortable, you're probably not doing the work." He was…
Growth feels risky. Staying the same is riskier. A teacher once told me: "If you're comfortable, you're probably not doing the work." He was…
Liked by Ernie Hayden
View Ernie’s full profile
-
See who you know in common
-
Get introduced
-
Contact Ernie directly
Other similar profiles
Explore more posts
-
Eric S. Yuan
Zoom for Government has received authorization from the Defense Information Systems Agency (DISA) for Department of Defense (DoD) IL4 NIPRNet and internet-facing communications 👉 https://zm.me/41P0yPq This continues our previous DISA authority and Air Force Authority to Operate but now adds IL4 collaboration directly behind the DoD Boundary Connection Access Point or BCAP. This authorization reflects DISA’s rigorous review and reinforces their trust in Zoom for Government as a secure and robust platform for DoD and its mission partners.
994
46 Comments -
Noah Sheinbaum
Steam Studio
Frontdoor is compiling a resource on the new tools to find customers in DoD Partial list below -- who else are we missing? - Pryzm by Nick LaRovere, Matt Hawkins and David Istrati - Obviant by Brendan Karp - Usul (YC S24) by Jarren Reid and Oliver Gomez - Sweetspot (YC S23) by Sachin S. and Philip Kung - Demand Signal by Catherine Edmonson - Deltek GovWin - GovSignals - CLEATUS AI Got use cases / success stories? Get in touch!
54
5 Comments -
Tom McAndrew
Coalfire
Coalfire Federal is proud to announce that we are officially authorized by the The Cyber AB to begin conducting #CMMC assessments as a Certified Third-Party Assessment Organization (#C3PAO)! These requirements will start rolling out in new Department of Defense contracts later this year and we are getting lots of questions on what this means now that assessments are official. We are honored to be among the first to receive this approval on the very first day assessments were authorized. We are the largest provider of independent cybersecurity assessments including #FedRAMP, #HITRUST, #ISO, #PCI, #SOC, and more than 100 other global certifications and frameworks such as #DORA, #C5, #TISAX, #HDS, #IRAP. (Yeah, its getting kind of crazy with the number of regulations out there, and we are here to make it easier for you.) Don't know where to start? We are happy to talk through different approaches, from mock-audits to penetration testing to see where you stand. Thanks to William Malone and Amy Williams PhD CISSP, CMMC-CCA, PA, PI in leading the way! #Cybersecurity #CoalfireFederal #C3PAO
193
11 Comments -
Mark W.
Caltech Center for Technology…
The problem is decades ago it was established that secure parts do not make for secure system. Peter Neumann's 2004 report is one good source for that, https://lnkd.in/gGPeqyx7. But systems thinkers would realize that without reading Neumann - security is an emergent property. Bottom line is that judging some component such as software as secure can only be done in context of use. Just another way compliance is not secure. Compliance (at least as practiced) does not account for the individual contexts. https://lnkd.in/g-5BBfwR
27
8 Comments -
Brian Hubbard
MSPCyberX
🚨 BIG NEWS in CMMC and NIST Compliance 🚨 The DoD just dropped a memo titled: “Department of Defense Organization-Defined Parameters for NIST SP 800-171 Rev. 3.” 👉 Read it here https://lnkd.in/eRCEndpm Why is this a big deal? Yes, CMMC currently maps to NIST SP 800-171 Rev. 2, not Rev. 3—but this memo is a signal of what’s coming. Within 2–3 years, CMMC will almost certainly shift to Rev. 3, and this memo tells us exactly what the DoD expects when it does. As someone who consults on and assesses dozens of CMMC environments a year, I hear these questions constantly: “How often do I need to review access logs?” “What’s the DoD’s minimum requirement for [X]?” Until now, the answer has been vague: “It depends on your risk tolerance… but at least annually.” Not exactly helpful. That changes today. This memo gives clear DoD-defined Organization-Defined Parameters (ODPs)—like timeframes, frequency, and thresholds—that you can (and should) start aligning with now, even if you’re still working under Rev. 2. Why wait? 🔹 The requirements in Rev. 2 and Rev. 3 largely overlap. 🔹 Aligning with these ODPs now means fewer surprises during future assessments. 🔹 You’ll be future-proofing your program for a smoother Rev. 3 transition down the road. My advice to all CMMC stakeholders: ✅ Start implementing these DoD-defined parameters now. It’s a smart move that shows maturity and preparedness—and it’ll pay off later. Let me know if you want to walk through what this means for your environment. #CMMC #NIST800171 #Rev3 #CybersecurityCompliance #DoD #DefenseContractors #ODP #FutureProof #CUI #CISSP #CyberSecurity
34
-
Dave Schroeder
University of…
In an era characterized by escalating cybersecurity threats, rapidly evolving technological landscapes, and heightened regulatory demands, organizations face significant pressure to modernize their Governance, Risk, and Compliance (GRC) practices. The federal government is also pivoting toward automation, with Policy-as-Code (PaC) becoming a foundational element in modern cybersecurity governance and compliance. A critical driver accelerating this urgency is a recent executive order that explicitly underscores robust cybersecurity frameworks, continuous monitoring, and adaptive compliance strategies. In response, organizations must move toward adopting innovative solutions such as Policy-as-Code methodologies.
88
9 Comments -
Laura Musser
MNS Group
A great day of panel sessions at AFCEA International #TechNetCyber2025 including Building Blocks for Cyber Security Maturity & Opportunities to Help Protect the Defense Supply Chain moderated by Daniel E. Turissini and included MNS Group ’s Tobias Musser, and R. Greg Manson of Tego, Cole French of Kratos Defense and Security Solutions and Uday Ali Pabrai of ecfirst. Some great takeaways from the session: - Dan encourages contractors to hire or put staff through the CCP class to gain the knowledge from a certified assessor or instructor to help prep your organization. - Ali shared Scoping and Assessment Guides makes exciting reading! Do it! - The that the single most important document for a CMMC Assessment is the SSP and shared that it is like an octopus with tentacles that points to your artifacts. - Cole shared that enclaves ease the assessment process by paring down scope. - Organizations struggle with Risk assessments, POAMs, and defined frequencies. - Title 48 will trigger Phase 1 of CMMC roll out. - Toby shared the CMMC assessor spreadsheet that gets uploaded to eMASS - He recommended that OSAs list out the details of where your assessor can find the artifacts in detail (page and paragraph) for their use during the assessment. There is a duel use: ease and speed of assessment and for the OSC’s team to understand what may be missing ahead of the assessment - Greg mentioned from the RPO perspective: as an extension of the OSC’s team to guide through #CMMC process. - He warned that after certification, all controls need to be maintained over time, plan ahead for continued compliance. - There is a growing demand for alignment between frameworks for OCS ROI These professionals have a great time together! With good humor they approached a complex program and critical topic for the #DIB and our nation.
24
3 Comments
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentAdd new skills with these courses
-
1h 36m
Controlling Cybersecurity Risk with Defender Vulnerability Management
-
13m
A Standalone Project: Build a Program to Encrypt and Decrypt Text Messages Using an Encryption Algorithm to Protect Data from Unauthorized Access
-
1h 34m
Managing Your Cybersecurity Program through a Merger or Acquisition
See who in Ernie’s network is hiring
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
LinkedIn is better on the app
Don’t have the app? Get it in the Microsoft Store.
Open the app