Cybersecurity made human for Ohio’s smallest organizationsYou are trying to keep people and services running, not become a cybersecurity expert. I work with Ohio’s smallest governments and businesses: townships, villages, small cities, libraries, school districts, fire and EMS, health districts, boards, and small manufacturers. If a requirement like HB 96, CMMC, NIST, or HIPAA just landed on your plate and you do not know where to start, you are in the right place.
This is for you if
You have one to three people doing almost everything
You are in Ohio and now have to deal with HB 96, CMMC, NIST, or HIPAA
You want help that respects your budget and does not talk down to you
The VEE MethodThe VEE Method is how I work: Visibility, Exposure, Execution.
EXECUTION
Fix What Matters
We fix what truly matters and skip security theater and busywork that will not protect you.
EXPOSURE
Find the Gaps
You get a clear view of what is covered, what is missing, and what could really hurt people or operations.
VISIBILITY
Don't Waste Time
We start with what you already have, like Microsoft 365, Google Workspace, backups, and free tools, before buying anything new.
Why VeeSafe existsVeeSafe exists to fix what small governments and small manufacturers hate about cybersecurity: confusing language, checklists that do not match reality, sky high pricing, and vendors who talk down to them. I make security simple, respectful, and doable for the smallest organizations in Ohio.My promise to you
When you work with me, you should feel good in your gut about where your money is going. I built VeeSafe so the smallest governments and businesses in Ohio have someone on their side who is not trying to squeeze them. I will not treat you like a line item to pull from. I will treat you like a partner who is trying to keep real people safe with very real limits. My pricing is fair on purpose so we all win. No games, no pressure, no slime.What I help with
I help with HB 96, CMMC and NIST, and HIPAA in a way that makes sense if you have no time, no security team, and a real world to protect.What “cybersecurity made human” means here
Cybersecurity made human is not a slogan for me. It is my line in the sand. I explain things so clerks, teachers, operators, trustees, and board members can follow, not just IT people. I focus on teaching instead of “dinging.” I design pricing so the smallest towns, boards, and businesses are not priced out before they begin.
Summit County: Akron, Cuyahoga Falls, Hudson, Stow, Green, Tallmadge, Barberton, Norton, Munroe Falls, Bath Township, Springfield Township, Copley Township, and all Summit County townships
Cuyahoga County: Cleveland, Parma, Strongsville, North Royalton, Middleburg Heights, Brooklyn, Solon, Pepper Pike, Gates Mills, Mentor, Bainbridge, Russell, and all Cuyahoga County townships
Medina County: Medina, Brunswick, Wadsworth, and Medina County townships
Portage County: Kent, Ravenna, Streetsboro, and Portage County townships
Plus: Stark, Lake, Mahoning, Wayne, and Geauga Counties

Who I ServeSmall public entities, HB 96 Townships, villages, libraries, fire and EMS districts, health districts, and school districts or boards that need hands on, done with you HB 96 cybersecurity programs.Select private sector, CMMC and NIST Northeast Ohio manufacturers, defense vendors, and specific healthcare practices that need advisory only support for CMMC, NIST 800-171, and related requirements.
Visibility (Do Not Waste Time) Use the tools you already own and build just enough security to meet your requirements, instead of buying enterprise software built for Fortune 500 companies.
Exposure (Find the Gaps) Get a quick reality check so you can see what is covered and what is missing, without a 90 page report that no one will read.
Execution (Fix What Matters) Focus on real risks to your people, services, and operations, and skip the security theater so you fix what actually protects you.
Risk assessment and governance Identify systems, data, and key risks, and define roles and responsibilities so someone clearly owns cybersecurity.
Controls using tools you already own Configure Microsoft 365, Google Workspace, built in endpoint protection, backups, and state provided resources instead of pushing new, expensive platforms.
Policies and procedures Create plain language policies for access, acceptable use, incident response, vendor management, and data handling that staff and board members can actually follow.
Training and awareness (without scare tactics) Provide short, practical education to help staff spot phishing, fraud, and ransomware without blame or fear based messaging.
Monitoring and incident response Build playbooks for detecting issues, containing incidents, recovering systems, and meeting HB 96 reporting timelines to state agencies and the Auditor of State.
Ongoing compliance Do regular reviews, updates, and documentation so you stay ready for audits and funding conversations instead of checking a box once and hoping for the best.
Ready to talk? Email me to set up a call and put GOV, CMMC, or HIPAA in the subject line so I know where to focus.
Zero dedicated security staff
Small budgets ($10K-$50K)
1-2 IT generalists managing both IT and OT
Safety-first operational cultures
Risk assessment in OT operational language
Compensating controls when patching isn’t safe
Integration with existing Process Hazard Analysis (PHA)
Safety-first decision making for cyber risks
Incident response integrated with existing emergency procedures
All-hands-on-deck scenarios using operational roles
Recovery procedures that respect production schedules
Continuous improvement tied to maintenance cycles
Can this be patched safely during operations?
What’s the testing requirement before deployment?
Is this an IT issue, OT issue, or both?
What are the risks of remediation vs. the vulnerability itself?
VEE Methodology implementation (3-12 month engagements)
TA Standard training for your team
Assessment and gap analysis using these frameworks
Ongoing support and refinement
For implementation inquiries: Email: [email protected]
Dedicated security teams
Substantial budgets
Enterprise-level tools
IT security expertise
Zero dedicated security staff
Small budgets ($10K-$50K)
1-2 IT generalists managing both IT and OT
Safety-first operational cultures
• CISA Now/Next/Never → Maps to VEE phases
• Process Safety Management → Integrates with Exposure phase
• Emergency Response Plans → Extends to cyber incidents in Execution
• Change Management → Incorporates security into existing procedures
✅ Small manufacturers (50-500 employees)
✅ Defense vendors
✅ Municipal water/wastewater systems
✅ Township government facilities
✅ Building automation environments
✅ Any operations where safety always comes before security changes, and security budgets are limited
HB 96 / Ohio Revised Code 9.64 for local government cybersecurity
CMMC and NIST 800-171 for manufacturers and defense work
HIPAA, through partners, for protecting health information in specific healthcare settings
Cybersecurity policies tailored to your budget and staff size
Incident response playbooks your team can actually use
Risk assessments that identify your real vulnerabilities
Training for staff who handle sensitive data
Ongoing support to keep you compliant
Ready to investigate?
Base service meets HB 96 and CMMC using free government resources (MS‑ISAC, CISA, FEMA), including training, policy templates, basic IR, board briefings, and audit prep.Optional add-ons are available if you need more than baseline compliance. No pressure.
💳 Payment Terms
When: Monthly invoice, net 30 days
How: Check, ACH, or credit card
Contract: Month-to-month, cancel anytime
Setup fee due: At contract signing
Base rate increases: Locked for 12 months
Free Lunch & LearnNot ready to commit? I offer a free 30–45 minute Lunch & Learn for your team covering:
What HB 96 or CMMC actually requires (in plain English)
The top gaps that fail audits
Free tools that meet requirements
Real pricing (no games) and when add‑ons make sense
Format: in‑person at your office (you provide lunch) or virtual (Zoom/Teams). No sales pitch, just useful info.
Your cost: Free.
To request one, email me and mention “Lunch & Learn.”VeeRisk Gap Analysis (Full Assessment)Free VeeRisk Snapshot (15–30 minutes)
Quick read on your current posture
Ballpark cost estimate
Honest “Are we a fit?” conversation
No obligation
Full VeeRisk Gap Analysis (Paid)
Full review of all HB 96 or CMMC controls
Detailed gap report with prioritized fixes
Written roadmap and implementation timeline
Cost: 1.5× your base monthly rate (one‑time), credited toward Year 1 if you move forward
Cybersecurity Oversight (for Organizations with IT Staff)
Already have IT handling the hands‑on work and just need a cybersecurity lead?What’s included: strategy and compliance guidance, quarterly reviews, priorities for your IT team, policy updates, compliance monitoring, and on‑call questions.What you handle: your IT staff implements technical controls, administration, and configuration.Pricing:
Initial gap analysis: 1.5× your base monthly rate (one‑time)
Ongoing oversight: 0.5× your base monthly rate
Great for organizations with IT staff that want expertise and accountability, not another MSP.Optional Enhanced Capabilities
Base service meets compliance. Add these only if needed:
Advanced Monitoring – Security Operations Intelligence
Monthly threat briefings, prioritized patch guidance, and critical alerts.
Local Gov: +$300–$925/month | Manufacturing: +$750–$4,500/month.
Incident Response Management Lite
Active help during incidents (beyond the basic IR plan).
Local Gov: $200–$750/month or $150–$300/hour
Manufacturing: $500–$2,000/month or $250–$500/hour
Community Workshops
Online safety talks and AI literacy sessions for schools, libraries, churches, business groups, and senior centers. Topics include:
Cybersecurity basics: phishing awareness, password security, cyber hygiene (included in annual bundle)
AI literacy & safety: what AI is and how it works, AI security basics, responsible AI use, spotting AI-generated content (deepfakes, voice cloning), safe use of AI tools (ChatGPT, etc.)
Pricing: $200–$1250 per 45–60 minute session, depending on audience size and customization. If booked outside a bundle, sessions are available à la carte.
Local Government (HB 96 Programs)
How Pricing WorksPricing is based on your organization's annual budget size. Then apply income-based discounts (0-60% off for lower-income communities).
Local Government ENTITIES (Based on Annual Budget)
| Annual Budget | Gap Analysis Fee | Setup Fee (One-Time) | Base Monthly Rate |
|---|---|---|---|
| Under $1M | $825 | $2,500 | $550 |
| $1M–$2M | $1,050 | $3,500 | $700 |
| $2M–$4M | $1,275 | $4,500 | $850 |
| $4M–$7M | $1,650 | $6,000 | $1,100 |
| $7M–$10M | $2,100 | $7,500 | $1,400 |
| Over $10M | Custom | Custom | Custom |
Applies to townships, fire/EMS, libraries, health districts, water/sewer utilities, SWCDs, and all other local government entities.
Gap Analysis = 1.5x base monthly rate. Creditable toward setup fee if you engage within 90 days.WHAT'S INCLUDED IN YOUR MONTHLY RATE✓ All 24 HB96 controls documented
✓ GASB cybersecurity compliance documentation
✓ Written policies and procedures
✓ Quarterly check-ins after Year 1
✓ Audit-ready documentation package
✓ Staff security awareness training using FREE government resources (MS-ISAC, CISA, FEMA modules)WHAT'S NOT INCLUDED IN BASE RATELocal Government - What’s NOT Included
✗ Software purchases (we use free tools you already own or government-approved free software)
✗ Hands-on IT work (your IT person or vendor does implementation)
✗ Active incident response support (basic IR plan IS included; active incident handling available as optional add-on)
✗ Custom security training (FREE government training IS included; custom branded content available as optional add-on)
✗ Proactive threat intelligence briefings (compliance monitoring IS included; sector-specific threat intel available as optional add-on)
✗ Travel fees outside Cuyahoga Falls (see distance tiers below)
Apply Income-Based DiscountI adjust pricing based on your community’s wealth.
| Tier | Income band | Poverty band | Discount |
|---|---|---|---|
| A+ Affluent | 100k+ | <15% | 0% |
| A Well‑off | 85k–100k | 15–25% | 0% |
| B Mixed | 70k–85k | 25–40% | 15–25% |
| C Working | 55k–70k | 40–55% | 40–50% |
| D High poverty | <55k | 55%+ | 50–60% |
Adjusted for distance from Cuyahoga Falls and community income/poverty indicators so lower‑income communities aren’t paying “affluent suburb” rates.
ADD-ONSHIPAA Compliance (Fire/EMS and Health Districts)
+$250–$1,500/month (based on community tier)Travel Fees (based on distance from Cuyahoga Falls)
Tier 1 (10-15 min): $0 per visit
Tier 2 (15-30 min): $7 per visit
Tier 3 (30-45 min): $15 per visit
Tier 4 (45-70 min): $25 per visit
Compare to separate consultants: $15,000–$25,000
Your savings: $9,000–$19,000
What Happens After Year 1?
Year 1: Heavy Lifting (documentation, implementation, training)
• 2-3 visits per week first 2 months
• Monthly visits months 3-12
• Full setup and implementation
Year 2+: Maintenance Mode
• Quarterly check-ins (4 per year)
• Annual compliance assessment
• Annual policy updates
• Annual training refresh
• Ad-hoc support via email/phoneAnnual Compliance Assessment (Starting Year 2)
• HB96 compliance review and gap analysis
• Updated policy documentation for law changes
• Review of new systems/assets
• Updated risk assessment
• Board presentation with compliance status
If one of these fits what you need, email with a short description of your situation or schedule & we’ll match you to the right option.
Many small governments recover their HB 96 investment by avoiding a single serious incident or by qualifying for grants and funding that expect a real cybersecurity program.
Manufacturing & Private-Sector (CMMC/NIST)
Advisory-Only Model for Manufacturing
For manufacturers, VeeSafe provides strategic CMMC/NIST compliance guidance; your MSSP or internal IT team handles all hands‑on technical implementation.✓ We guide what to implement for CMMC compliance
✗ We don’t configure firewalls, routers, or security infrastructure
✗ We don’t replace your MSSP or IT teamBase advisory uses free government NIST templates and CMMC resources, with optional add‑ons available.Manufacturing & Private-Sector Pricing (before modifiers)
CMMC advisory pricing is based on CMMC level and employee count, with a modifier for multiple locations when needed.
CMMC Level 1 (17 Basic Practices)
For clients with: Basic contract terms, no technical data (Federal Contract Information FCI only)What we assess:
Access control, MFA, physical security, basic cyber hygiene
Gap report showing which of 17 practices need work
Timeline: 3-6 months
Self-assessment only (no C3PAO required)
CMMC Level 1 – Advisory Only (Manufacturing & Private Sector)
Pricing is based on your annual DoD contract value.
| Contract Value (Annual) | Year 1 (Assessment + Build) | Year 2+ (Maintenance) |
|---|---|---|
| Under $500K | $8,500 | $5,200/year |
| $500K–$2M | $10,500 | $6,400/year |
| $2M–$5M | $13,000 | $7,800/year |
| $5M+ | $15,500 | $9,400/year |
New to DoD Work? (Pursuing First Contract)
Add a one‑time setup fee equal to 0.5× your Year 1 amount to cover SAM registration support, basic contract readiness, and baseline documentation.CMMC Level 2 (110 Practices)
For clients with: Technical drawings, specs, export-controlled data (Controlled Unclassified Information CUI)
What we assess:
All 110 NIST 800‑171 controls across 14 domains
Critical gaps that would block the 88% minimum score
Which gaps can go on a POA&M (when allowed)
Whether a self‑assessment is enough or a C3PAO assessment is required
Typical advisory timeline: 6–18 months, depending on scope and readiness
| Contract Value (Annual) | Year 1 (Assessment + Build) | Year 2+ (Maintenance) |
|---|---|---|
| Under $500K | $25,500 | $15,600/year |
| $500K–$2M | $31,500 | $19,200/year |
| $2M–$5M | $39,000 | $23,400/year |
| $5M+ | $46,500 | $28,200/year |
Level 2 pricing reflects the much heavier scope (110 practices) and third‑party assessment prep, and is roughly three times the Level 1 advisory effort and cost for similar contract sizes.C3PAO Assessment Prep (Level 2)
For organizations heading into a third‑party CMMC Level 2 assessment, I offer focused readiness support so you walk in organized and confident.What’s included:
Evidence mapping and documentation review (SSP, POA&M, policies, diagrams)
Mock assessor-style questions and interview prep for key staff
Readiness check against the CMMC Level 2 assessment guide and common assessor expectations
What’s NOT Included
✗ Emergency IT support or break‑fix work
✗ Hands‑on technical implementation (your MSSP/IT team does this)
✗ Active incident response handling (beyond the basic IR plan; full IR help is an optional add‑on)
✗ Custom security training (beyond free government training, available as an optional add‑on)
✗ Proactive threat‑intelligence briefings (available as an optional add‑on)
✗ C3PAO assessment fees (paid directly to the assessor)
✗ Travel fees for work outside the Cuyahoga Falls area
If one of these fits what you need, email with a short description of your situation or schedule & we’ll match you to the right option.
Many clients recover their CMMC investment with a single defense contract award or renewal.
Cybersecurity Made HumanMy mission is straightforward: I do cybersecurity so you can focus on your business and your community. VeeSafe Technology gives small organizations in Northeast Ohio (townships, districts, and manufacturers) practical cybersecurity that fits how you actually operate. No jargon, no overcomplicated solutions. Just honest, calm help from someone who understands your world.Vision: Northeast Ohio thrives when the organizations that keep it running can do their work safely and confidently. Local governments, manufacturers, and community services are the backbone of this region. This company exists for the people who make that happen.Why VeeSafe TechnologyVeeSafe is intentionally small, local, and personal. I've built cybersecurity programs for automotive manufacturers and led IT/OT vulnerability management at a Northeast Ohio steel operation, so I understand production lines, downtime, and how losing a contract or suffering an outage ripples through an entire community.I work in person with your team whenever possible, so you're never left alone with a binder and a checklist. I'm local to Northeast Ohio, which means I understand your budgets, staffing realities, and community pressures. I speak simply and avoid jargon so trustees, clerks, teachers, operators, and board members can all follow along.I charge fair prices that scale to your size and community. Things like township revenue or percentage of students on free and reduced lunch matter because cybersecurity shouldn't take money away from services.As a Vietnamese American woman in cybersecurity, I'm part of a very small group. That perspective helps me open doors and build networks for clients. As a woman owned and minority owned business, I can also help you meet diversity and small business participation goals in grants, contracts, and vendor policies.My BackgroundI'm Vina, and I live right here in Cuyahoga Falls. My parents came to the U.S. as refugees and moved to Youngstown, so I grew up valuing stability, hard work, and anything that supports families and communities. Manufacturing and local government both do that through steady jobs, safe services, and by quietly keeping everything running.I left corporate life on good terms to focus on what I care about most: helping small Ohio governments meet HB 96, helping manufacturers navigate CMMC and NIST, and doing it in a way that's straightforward and human.Beyond the WorkCybersecurity isn't just about plants and contracts for me. I teach people of all ages how to stay safe online. Grandparents at senior centers, parents protecting their families, teens learning smart habits, and kids getting the basics in a fun way. I give talks at libraries and community groups because I like seeing the lightbulb turn on and watching people feel more confident. When I'm not doing cybersecurity, I love ballroom dancing.If you're in Northeast Ohio and need straightforward help, whether it's an HB 96 program for your township or a CMMC roadmap for your plant, let's talk. Email me at [email protected] or call me at 330-559-0886. You actually get to talk with me, not AI or an automatic message/reply.
Woman owned | Minority owned | Based in Northeast Ohio.

Credentials & Real-World Experience
Third-Party Validation:
Industry Credentials & Commitments:
Federal contracting ready – Active and in good standing in SAM.gov, so agencies and primes can work with VeeSafe Technology as a registered small business vendor.
Cloud Security Alliance - AI Trustworthy Pledge Signatory (2026)
CMMC Compliance Specialist - Helping Northeast Ohio manufacturers secure government contracts through Cybersecurity Maturity Model Certification.
Youth STEM Educator - Founder of Northeast Ohio VeeSTEM Defender, inspiring the next generation of ethical cybersecurity professionals.
Community Partner - Partnering with libraries, schools, and organizations to provide accessible cybersecurity education for all ages.

If you’re a Northeast Ohio manufacturer or local government and want help staying secure and compliance‑ready, let’s talk.
Let's Keep This Simple
Let Me Handle the Security. You Handle Everything Else.Whether you're a township trustee figuring out HB 96, a manufacturer pursuing your first defense contract, or a school district protecting student data, VeeSafe Technology helps you navigate cybersecurity requirements without disrupting operations or overwhelming your team.Not Sure Where to Start?Schedule a free VeeRisk Snapshot to understand where you stand. We'll talk through your current situation, identify gaps, and map out practical next steps. No sales pressure. Just honest assessment and clear guidance from someone who understands both your operations and cybersecurity compliance.What happens next: After you reach out, we'll schedule a 30-minute call to discuss your needs. If it makes sense to work together, I'll send a straightforward proposal. If not, I'll point you toward resources that can help.I'm based in Cuyahoga Falls and work throughout Northeast Ohio, including but not limited to Summit, Stark, Portage, Cuyahoga, Medina, Lake, and Mahoning counties.
Already know you need help?
You get me, not AI or an automatic reply. I’ll respond within one business day, usually sooner. Email a short description of your situation, plus (HB96/CMMC/NIST/HIPAA) and timeline. I usually reply within one business day.
VeeSafe Technology Privacy Policy
Last Updated: January 2026The Short VersionWe collect minimal information, protect what we do collect, and give you control over your data. No surprises, no fine print tricks.What We CollectInformation you give us:
- Name, email, phone (when you reach out or book a call)
- What you tell us during consultationsInformation collected automatically:
- Google Analytics data (how people use the site, but not who you are)
- Cookies for site functionality
- IP address for securityWhat we DON'T collect:
- Credit card information
- Social security numbers
- Any sensitive business data (unless you're a client under separate agreement)How We Use Your InformationPretty straightforward:
- Respond to your questions
- Schedule consultations
- Understand how people use the site (so we can make it better)
- Comply with legal requirements if neededWe don't:
- Sell your data
- Spam you with marketing emails
- Share your information with third parties (except tools like Google Analytics)## Your Control (GDPR Rights)If you're in the EU (or anywhere, really, we treat everyone the same):You can:
- See what data we have about you
- Correct anything that's wrong
- Delete your data completely ("Right to be Forgotten")
- Export your data
- Opt out of analytics anytime (use the cookie banner at the bottom)Just email us: [email protected]## How We Protect Your Data- HTTPS encryption (the lock icon in your browser)
- Automatic email redaction after 30 days (we delete inquiry emails unless you become a client)
- Limited access (only Vina sees your information)
- No unnecessary data storage (we only keep what we need)
- Regular security updates## Third-Party Tools We UseGoogle Analytics 4:
Helps us understand site traffic (like "50 people visited the pricing page"). We can't identify individual visitors, and analytics only run if you consent via the cookie banner.Consentmanager.net:
Manages your cookie preferences (that banner at the bottom of the site).## How Long We Keep Data- Inquiry emails: 30 days, then auto-deleted (unless you become a client)
- Client data: Kept per our client agreement (typically during engagement + 2 years)
- Analytics data: 14 months (Google's default)
- Cookies: 2 years or until you clear them## Changes to This PolicyIf we change how we handle data, we'll update this page and note the date at the top.---## Questions?Privacy inquiries:
Vina Ta
VeeSafe Technology
[email protected]
Cuyahoga Falls, OH, USABy using this site, you agree to this Privacy Policy.VeeSafe Technology | Cybersecurity Made Human
Last Updated: January 2026The Short VersionWe collect minimal information, protect what we do collect, and give you control over your data. No surprises, no fine print tricks.What We CollectInformation you give us:
- Name, email, phone (when you reach out or book a call)
- What you tell us during consultationsInformation collected automatically:
- Google Analytics data (how people use the site, but not who you are)
- Cookies for site functionality
- IP address for securityWhat we DON'T collect:
- Credit card information
- Social security numbers
- Any sensitive business data (unless you're a client under separate agreement)How We Use Your InformationPretty straightforward:
- Respond to your questions
- Schedule consultations
- Understand how people use the site (so we can make it better)
- Comply with legal requirements if neededWe don't:
- Sell your data
- Spam you with marketing emails
- Share your information with third parties (except tools like Google Analytics)## Your Control (GDPR Rights)If you're in the EU (or anywhere, really, we treat everyone the same):You can:
- See what data we have about you
- Correct anything that's wrong
- Delete your data completely ("Right to be Forgotten")
- Export your data
- Opt out of analytics anytime (use the cookie banner at the bottom)Just email us: [email protected]## How We Protect Your Data- HTTPS encryption (the lock icon in your browser)
- Automatic email redaction after 30 days (we delete inquiry emails unless you become a client)
- Limited access (only Vina sees your information)
- No unnecessary data storage (we only keep what we need)
- Regular security updates## Third-Party Tools We UseGoogle Analytics 4:
Helps us understand site traffic (like "50 people visited the pricing page"). We can't identify individual visitors, and analytics only run if you consent via the cookie banner.Consentmanager.net:
Manages your cookie preferences (that banner at the bottom of the site).## How Long We Keep Data- Inquiry emails: 30 days, then auto-deleted (unless you become a client)
- Client data: Kept per our client agreement (typically during engagement + 2 years)
- Analytics data: 14 months (Google's default)
- Cookies: 2 years or until you clear them## Changes to This PolicyIf we change how we handle data, we'll update this page and note the date at the top.---## Questions?Privacy inquiries:
Vina Ta
VeeSafe Technology
[email protected]
Cuyahoga Falls, OH, USABy using this site, you agree to this Privacy Policy.VeeSafe Technology | Cybersecurity Made Human
VeeSafe Technology Trademark & Licensing
COPYRIGHT AND TRADEMARK NOTICEThe VEE™ Methodology (Visibility, Exposure, Execution), GRC Threat Hunting™, and the Technical Actuality (Ta) OT-CVE Standard are proprietary frameworks and services developed by Vina Ta and VeeSafe Technology LLC.Copyright © 2026 VeeSafe Technology LLC. All rights reserved.Trademark Notice: VEE, GRC Threat Hunting, and Ta OT-CVE Standard are trademarks of VeeSafe Technology LLC (registration pending). Unauthorized commercial use of these framework names, methodologies, or service names without permission is prohibited.Government and Standards Bodies: NIST, CISA, and other federal/state agencies are welcome to reference, incorporate, or adapt the VEE Methodology and Ta OT-CVE Standard for public guidance purposes.Commercial Implementation: Organizations implementing these frameworks for their own internal use are welcome to do so. Consultants, trainers, and commercial entities wishing to offer services based on these frameworks should contact VeeSafe Technology for licensing or partnership opportunities.Academic and Research Use: Researchers and educators may reference these frameworks with proper attribution.For licensing, partnerships, or questions:
Email: [email protected]
Frequently Asked QuestionsDo you work with local government or just manufacturers?
I work with both. I help small Ohio governments (townships, libraries, fire/EMS, health, schools) build and maintain HB 96 cybersecurity programs, and I advise manufacturers and service providers on CMMC and NIST 800‑171 compliance.What is HB 96 and why does it matter?
HB 96 is Ohio’s cybersecurity law for political subdivisions. It requires a real cyber program with risk assessment, controls, policies, training, incident response, and ransomware/incident reporting rules, and auditors now expect clear evidence you are doing these things.Who counts as a political subdivision under HB 96?
Counties, townships, cities, villages, school districts, libraries, and other local public bodies are all covered. If you are a local public entity serving an Ohio community, HB 96 likely applies to you.What is CMMC and why do manufacturers need it?
CMMC (Cybersecurity Maturity Model Certification) is the Defense Department’s standard for protecting federal data. If you are in the DoD supply chain, even as a small shop or subcontractor, you need the right CMMC level to bid, win, and keep contracts.How is CMMC different from HB 96 or HIPAA?
HB 96 is a state requirement for Ohio local governments. HIPAA protects health information for clinics and health entities. CMMC is a federal requirement tied to defense contracts and NIST 800‑171. Many security practices overlap, so I design one program that can support multiple frameworks instead of three separate systems.How long does this take?
Most small governments can stand up a working HB 96 program in a few months with focused effort. Most manufacturers reach CMMC readiness in about six to eighteen months, depending on starting point, number of gaps, and how quickly changes can be made.Do you implement the controls?
No. I am advisory‑only. I assess where you are, design the program, create documentation, train your team, and review their work. Your staff or your IT/MSSP handles the hands‑on implementation so you stay in control of your systems.What if we don’t have IT staff?
You still have options. I can coach a designated staff member on the basics, guide your existing IT provider or MSP to implement to the right standard, and, when needed, refer trusted Northeast Ohio partners for deeper technical help.Do you only work in Northeast Ohio?
My primary in‑person area is Northeast Ohio, roughly within seventy minutes of Cuyahoga Falls. I also work remotely with some organizations in the rest of Ohio when a mostly‑remote advisory relationship makes sense.How do you work with us over the first year and after?
Year 1 is buildout: more frequent working sessions to get risk assessment, documentation, and key controls in place. After Year 1, we shift into maintenance with scheduled check‑ins, annual reviews, and policy/training refreshes so the program stays alive instead of becoming shelf‑ware.Do you work on our systems or yours?
I work inside your environment using accounts you control. Your data stays with you; I do not keep copies of your systems on my own devices. I use secure cloud tools for documentation when appropriate, and you can remove my access at any time. Bad actors try to take control away from you; I do the opposite and help you keep control.What is OT and why does it matter for cybersecurity?
OT (operational technology) is the equipment and control systems that run physical processes like machines, production lines, pumps, and treatment systems, as opposed to IT, which manages business data and emails. When OT is connected to IT networks, cyberattacks can shut down operations or damage equipment, so I design programs that protect both your business systems and your physical operations.Why is CMMC Level 2 so much more than Level 1?
Level 1 is basic practices and a self‑assessment. Level 2 covers 110 practices mapped to NIST 800‑171, requires much deeper documentation, and often involves a third‑party assessment, so it is several times more work than Level 1. I help you confirm which level you truly need before you invest.How does new‑hire training work?
I provide short, repeatable security training you can plug into orientation. For manufacturers, that may be a quarterly or semi‑annual session; for local governments, simple materials and periodic refresh sessions keep people from forgetting what to do.What if we start small and need more later?
That is normal. You can start with a basic HB 96 program or CMMC Level 1 advisory and add capabilities (like Level 2 work, monitoring, or incident‑response help) as your risk, size, or contracts grow. We build on what you already have instead of restarting from scratch.Can multiple organizations share workshop costs?
Yes. Townships, libraries, schools, or manufacturers can pool together for a shared workshop and split the fee so each pays less while still walking away with practical steps and templates they can use.Do rates change as we grow or shrink?
Yes. Every quarter we look at your employee count or scope. If you move into a higher tier, your rate adjusts up; if you move down, your rate goes down for future months. The goal is fair pricing that moves with your reality instead of locking you in.Why should we choose you instead of a big firm?
I’m local, I show up in person, and I speak in plain language. I focus on smaller governments and manufacturers that big firms overlook, bring real OT and critical‑infrastructure experience, and tie pricing to your budget and community so cybersecurity feels doable instead of overwhelming.