
Gain the edge in cyber.
Grow your talent.
Look at what we’ve created for you!
February ‘25 - Our new CyberSeries video has launched for Continuous Monitoring to train your team in less time. This series is the perfect addition to onboarding training or as brown bag luncheon. Plus, our CyberSeries videos are customizable to include your policies and procedures specific to your organization. Contact us.
CyberSerices: 01 - Continuous Monitoring | Demo vid: varicas.com.
Cyber in the News
Top role in cybersecurity?
According to TechRepublic, security engineer was at the top of the job posts in 2024. Who would have guessed that privacy attorney would be in the top 5? See the full list here.
Security engineer
Security analyst
DevSecOps
Cybersecurity/Privacy Attorney
Security Architect
Resource: (Crouse M) 2025 March 27. https://www.techrepublic.com/article/news-cybersecurity-job-market/
About Cyber Code Lab
We are a cyber security firm committed to developing the tools and talent needed to manage the constantly evolving cyber threat landscape.
To enhance your Organizations cyber capabilities, we offer the following services:
Security Assessments - RMF, NIST, FedRAMP, CIS,
Security Audit Preparation - Internal, External (e.g. OMB)
Technical Writing and Documentation
Professional Development and Training
CCL cyber professionals have more than 20 years of information system security experience at the - application/software - OS/platform - network/infrastructure levels and we welcome the opportunity to serve as members of your team.
Tools
Our current tools were created to address the increasing demand for cyber security professionals. By streamlining the path to becoming a cyber security professional, our tools allow your Organization to gain the cyber edge with a more knowledgeable cyber team.
Our first Blog Series - ‘What’s New in NIST?: Transition from Rev 4 to Rev 5 - we get up close and personal with the Rev 5 security & privacy control families in our FREE 2 minute videos. Each video features an overview of the control family, followed by changes from Rev 4 to Rev 5 and concludes by highlighting a few of the controls. So whether you’re an Analyst/ISSO/Assessor with little time to read all three Rev5 artifacts - (800-53, 800-53B and 800-53A) or new pro who needs to learn NIST fundamentals ASAP, you’ll be up to speed in no time.
Part 20 - Systems Information and Integrity (SI)
Part 19 - Systems and Communication Protection(SC)
Part 18 - System and Service Acquisition (SA)
Part 17 - Risk Assessment (RA)
Part 16 - Personnel Security (PS)
Part 15 - Program Management (PM)
Part 14 - Planning (PL)
Part 13 - Physical and Environmental (PE)
Part 12 - Media Protection (MP)
Part 11 - Maintenance (MA)
Part 10 - Incident Response (IR)
Part 8 - Contingency Planning (CP)
Part 7 - Configuration Management (CM)
Part 5 - Awareness & Training (AT)
Part 4 - Audit and Accountability (AU)
Part 3 - Access Control (AC)
Part 2 - PII Privacy and Transparency (PT)
Contact
Feel free to contact us with any questions.