Welcome to Cyber Muster!
My name is Justin. I am a Christian, husband, father, and veteran, and I have insatiable desire to grow and learn.
Throughout life, I’ve been blessed to pursue many paths that have taught me valuable lessons about life, success, and overcoming challenges.
My passion for learning and self-improvement has led met through 20 years in technology, my CISSP certification, and most recently, obtaining my Master of Engineering Technical Management from Texas A&M University. (Gig ‘Em!)
My intent with Cyber Muster is to have a venue where I share lessons, insights, and expertise on various topics, including technology, marketing, mindset, and learning.
I have a unique perspective on technology and its role in modern society, believing technology can be a force for good, but only if it is used responsibly and through clearly understanding its potential impact.
I maintain writings here and invite you to follow me on medium.cybermuster.com. There, you’ll find my articles in addition to a wide range of topics, including cybersecurity, artificial intelligence, and the future of work.
I hope you enjoy reading my blogs and that you find the information provided useful and informative. If you have any questions or feedback, I’d love to hear from you, so feel free to leave a comment or get in touch with me directly. Thank you for joining me on this journey of growth and learning.
If you’d like to subscribe to my newsletter and receive information straight to your inbox, please let me know by filling out the form below.
Want to change your financial life?
Check out Wealth With God by Pastor Jim Baker.
USE CODE: JUSTIN
Latest Posts
- Cybersecurity: Functions (Part 5)Detect. If you are following Cybersecurity news and trends you are likely recognizing that breaches are becoming numbingly commonplace. As… Read more: Cybersecurity: Functions (Part 5)
- Cybersecurity: Functions (Part 4)Protect. This function, protection, is perhaps the most common function associated with cybersecurity. When speaking about the CIA triad, the… Read more: Cybersecurity: Functions (Part 4)
- Cybersecurity: Functions (Part 3)Under NIST, to know the organization, its risk profile, threats, vulnerabilities, priorities, requirements, and capabilities, we use the function Identify.