top of page
Yastis | Cybersecurity Consulting
Frequency wave.png

Cyber Risk Assessments, Enhancements, SOC 2 Prep,

and More

Need stronger business cybersecurity?
Click below to schedule a free 30-min meeting.

Referral Program

Frequency wave.png

Cyber Risk Assessments, Enhancements, SOC 2 Prep,

and More

Need stronger business cybersecurity?
Click below to schedule a free 30-min meeting.

Assessments

Cybersecurity assessments list

Enhancements

Cybersecurity enhancements list
  • LinkedIn

Michael Andrewes, CGEIT, CISSP, PMP

Michael is the Yastis Founder and Lead Cybersecurity Consultant. He has 20 years of cybersecurity, IT, and telecom experience in the US DoD and as an entrepreneur. He founded Yastis to help small and medium-sized tech-enabled businesses minimize cyber risks and stay compliant.

 

For more info:

About

About

  • LinkedIn

Michael Andrewes, CGEIT, CISSP, PMP

Michael is the Yastis Founder and Lead Cybersecurity Consultant. He has 20 years of cybersecurity, IT, and telecom experience in the US DoD and as an entrepreneur. He founded Yastis to help small and medium-sized tech-enabled businesses minimize cyber risks and stay compliant.

For more info:

Frequently Asked Questions (FAQs)

How do you ensure confidentiality and security of our data?

We sign NDAs, have strict policies and procedures, use industry-standard encryption, and train consultants on data handling.

What qualifications do your consultants have?

Our consultants have extensive experience and qualifications, including certifications such as CISSP, Sec+, and others.

Do you work with clients long-term or only short-term projects?

We provide support long-term or on a per-project basis, tailored to meet client requirements, even as they change over time.

Can you describe your typical process for completing projects?

We analyze the client's environment, conduct a risk assessment and gap analyses, then develop a plan to enhance security controls.

Assessments

Cybersecurity Services

Enhancements

Cybersecurity Services
Yastis staffing graphic
Yastis training programs graphic
Yastis management reporting graphic
Yastis system monitoring graphic
Yastis technical controls graphic
Yastis documentation graphic

Enhancements

Yastis custom graphic
PCI DSS graphic
NIST RMF graphic
NIST CSF graphic
CIS 18 graphic

Assessments

Yastis why graphic

Referral Program

Contact Us

bottom of page