About Us

At Curated Cyber, our team of cybersecurity experts is 
dedicated to delivering tailored, cutting-edge
security solutions for your business.

Simplifying Your Cybersecurity Journey

About Us

At Curated Cyber, our team of cybersecurity experts is dedicated to delivering tailored, cutting-edge security solutions for your business.

Simplifying Your Cybersecurity Journey

Meet Our Team

Brandon Gettert

Brandon is a seasoned cybersecurity professional with over two decades of experience and a proven track record in compliance, governance, networking, IT infrastructure, and management. Renowned for his ability to identify and mitigate risks, Brandon specializes in ethical hacking, vendor management, and the development of comprehensive information security programs.

A skilled communicator and educator, Brandon is a sought-after speaker and trainer on cybersecurity topics. He is the co-founder and CEO of Curated Cyber, a leading provider of vCISO services, and the founder and President of Lithium Advisors, a cybersecurity board advisory service, where he helps organizations navigate the complexities of cybersecurity governance.

In addition to his leadership roles, Brandon shares his expertise as an instructor at Elite CEU, where he draws on his vast experience in financial services, education, the public sector, and software development to offer practical insights and real-world examples.

Recognized as a leader and innovator in the cybersecurity field, Brandon is dedicated to advancing the industry through education, practical solutions, and thought leadership.

Read More Close

Heath Stanley

Heath is an accomplished cybersecurity executive with over 15 years of expertise in building strategic client partnerships, architecting comprehensive cybersecurity frameworks, and steering cross-functional teams to success. With a deep and diverse background in compliance, governance, networking, IT infrastructure, and leadership, Heath has consistently delivered outstanding results for his clients.

His journey into cybersecurity began with hands-on experience, literally sifting through dumpsters to uncover sensitive Personally Identifiable Information (PII) and exposed passwords. Now a business leader with a sharp cybersecurity focus, Heath has played an instrumental role in building profitable business units by leveraging his skills in leadership, sales, delivery, incident management, and scoping.

As the Co-Owner, President, and CISO of Curated Cyber, Heath drives the creation of tailored cybersecurity strategies that address the unique needs of each client, ensuring full compliance with regulatory demands and industry standards. He leads from the front in incident response efforts, while also educating teams on best practices in cybersecurity, contributing to the advancement of the industry. His greatest pride comes from the relationships he has cultivated and his ability to pinpoint key needs in any environment, making him a pivotal force in realizing the company’s vision and growth objectives.

Read More Close

Davis Arnold

Davis is an Information Security Analyst at Curated Cyber, where he supports risk assessments, incident response, and IT Governance. He holds a degree in Information Systems with a focus on cybersecurity and brings prior experience from managed service provider environments and IT support roles. Davis plays an active role in developing NIST CSF-aligned controls, building GLBA risk assessments, and translating technical requirements into practical, actionable solutions. His background in troubleshooting, process improvement, and client communication supports Curated’s mission of delivering effective and scalable security strategies.

Cynthia Mackie

Cynthia Mackie is a skilled vendor management professional known for her ability to prioritize tasks and deliver innovative solutions under pressure. At Curated, she ensures that vendors meet compliance standards and align with risk protocols. Cynthia excels at addressing security challenges with precision and a positive, proactive approach. Cynthia’s strong problem-solving skills and focus on cybersecurity make her a valuable asset to the Curated Team. 

Jason Nichols

Jason is an experienced project manager specializing in strategic planning, team leadership, and vendor management. At Curated, he ensures vendors meet compliance standards and align with security protocols, driving secure and effective project outcomes. His expertise in project management and staying ahead of industry trends allows him to deliver reliable solutions that protect critical assets and support organizational growth.

Our Service Offerings

Risk Management

Risk management for a vCISO involves identifying, assessing, and mitigating threats to an organization’s information systems.  A vCISO ensures that risk management aligns

with business objectives and regulatory compliance. By effectively managing risks, vCISOs protect sensitive data, maintain business continuity, and build trust with stakeholders.

Read More Close

Audit/Exam Support

A vCISO supports audit and exam preparation by ensuring thorough documentation, conducting internal audits, and providing guidance to the organization.

This includes aligning security practices with industry standards and fostering open communication with auditors to achieve audit readiness.

Read More Close

Cyber Policies

A vCISO develops and refines cybersecurity policies aligned with business objectives. They ensure policies are comprehensive, compliant, and effectively communicated

throughout the organization. By conducting regular reviews and updates, vCISOs maintain policy relevance and effectiveness in mitigating risks.

Read More Close

Breach Response

A vCISO approaches breach response with a focus on containment, assessment, remediation, and learning. This involves detection and response, incident response

planning, and risk management. A vCISO aims to minimize damage, protect the organization’s reputation, and ensure business continuity.

Read More Close

Security Awareness

A vCISO approaches security awareness by fostering a culture of security within an organization. This involves developing and implementing comprehensive training

programs, promoting security best practices, and encouraging employee participation in security initiatives. By raising awareness and empowering employees to identify and report potential threats, a vCISO helps create a more resilient security posture.

Read More Close

Business Continuity

A vCISO develops and implements business continuity plans to minimize disruptions. They assess potential risks, create strategies for recovery, and conduct regular testing. 

By integrating security measures into these plans, vCISOs ensure the protection of critical assets and data during and after a crisis.

Read More Close

Third-Party App Management

A vCISO oversees the management of third-party applications by assessing risks, implementing security controls, and monitoring performance. 

This includes vendor management, incident response planning, and ensuring compliance with organizational standards.

Read More Close

Framework

A vCISO aligns business objectives with security frameworks. They assess an organization’s needs, recommend suitable frameworks, and guide implementation.

By bridging the gap between business and IT, vCISOs ensure that security measures support operational goals while mitigating risks.

Read More Close

Vendor Management

A vCISO strengthens vendor management by implementing rigorous evaluation processes. This includes assessing vendor risk profiles, negotiating contracts with

robust security clauses, and monitoring vendor performance. By establishing clear guidelines and enforcing compliance, vCISOs mitigate supply chain risks and protect sensitive information.

Read More Close

Click the button above for answers to the most common questions we hear from banks and businesses.

Simplify Your Cybersecurity Journey

Share this: