Cybersecurity made human for Ohio’s smallest organizationsYou are trying to keep people and services running, not become a cybersecurity expert. I work with Ohio’s smallest governments and businesses: townships, villages, small cities, libraries, school districts, fire and EMS, health districts, boards, and small manufacturers. If a requirement like HB 96, CMMC, NIST, or HIPAA just landed on your plate and you do not know where to start, you are in the right place.
This is for you if

  • You have one to three people doing almost everything

  • You are in Ohio and now have to deal with HB 96, CMMC, NIST, or HIPAA

  • You want help that respects your budget and does not talk down to you

The VEE MethodThe VEE Method is how I work: Visibility, Exposure, Execution.


EXECUTION
Fix What Matters
We fix what truly matters and skip security theater and busywork that will not protect you.

EXPOSURE
Find the Gaps
You get a clear view of what is covered, what is missing, and what could really hurt people or operations.

VISIBILITY
Don't Waste Time
We start with what you already have, like Microsoft 365, Google Workspace, backups, and free tools, before buying anything new.


Why VeeSafe existsVeeSafe exists to fix what small governments and small manufacturers hate about cybersecurity: confusing language, checklists that do not match reality, sky high pricing, and vendors who talk down to them. I make security simple, respectful, and doable for the smallest organizations in Ohio.My promise to you
When you work with me, you should feel good in your gut about where your money is going. I built VeeSafe so the smallest governments and businesses in Ohio have someone on their side who is not trying to squeeze them. I will not treat you like a line item to pull from. I will treat you like a partner who is trying to keep real people safe with very real limits. My pricing is fair on purpose so we all win. No games, no pressure, no slime.
What I help with
I help with HB 96, CMMC and NIST, and HIPAA in a way that makes sense if you have no time, no security team, and a real world to protect.
What “cybersecurity made human” means here
Cybersecurity made human is not a slogan for me. It is my line in the sand. I explain things so clerks, teachers, operators, trustees, and board members can follow, not just IT people. I focus on teaching instead of “dinging.” I design pricing so the smallest towns, boards, and businesses are not priced out before they begin.

  • Summit County: Akron, Cuyahoga Falls, Hudson, Stow, Green, Tallmadge, Barberton, Norton, Munroe Falls, Bath Township, Springfield Township, Copley Township, and all Summit County townships

  • Cuyahoga County: Cleveland, Parma, Strongsville, North Royalton, Middleburg Heights, Brooklyn, Solon, Pepper Pike, Gates Mills, Mentor, Bainbridge, Russell, and all Cuyahoga County townships

  • Medina County: Medina, Brunswick, Wadsworth, and Medina County townships

  • Portage County: Kent, Ravenna, Streetsboro, and Portage County townships

  • Plus: Stark, Lake, Mahoning, Wayne, and Geauga Counties

WHO, WHY & HOW I HELP

a picture of a business involved in manufacturing, healthcare, and community services for cybersecurity it’s of people diversity with grandparents and it feels warm and inviting

Who I ServeSmall public entities, HB 96 Townships, villages, libraries, fire and EMS districts, health districts, and school districts or boards that need hands on, done with you HB 96 cybersecurity programs.Select private sector, CMMC and NIST Northeast Ohio manufacturers, defense vendors, and specific healthcare practices that need advisory only support for CMMC, NIST 800-171, and related requirements.


The VEE™ Method: Visibility, Exposure, Execution
Most cybersecurity consultants overcomplicate things or sell you tools you do not need. I work differently.

  • Visibility (Do Not Waste Time) Use the tools you already own and build just enough security to meet your requirements, instead of buying enterprise software built for Fortune 500 companies.

  • Exposure (Find the Gaps) Get a quick reality check so you can see what is covered and what is missing, without a 90 page report that no one will read.

  • Execution (Fix What Matters) Focus on real risks to your people, services, and operations, and skip the security theater so you fix what actually protects you.

VeeSafe Technology is built around these three principles: visibility, exposure, and execution. I help you see what is covered and what is missing, build the right amount of security with your existing tools, and focus on the risks that actually matter.

What I Do
I help small organizations build and run a complete cybersecurity program that aligns with Ohio House Bill 96 requirements for public entities.
For local government clients, this includes:

  • Risk assessment and governance Identify systems, data, and key risks, and define roles and responsibilities so someone clearly owns cybersecurity.

  • Controls using tools you already own Configure Microsoft 365, Google Workspace, built in endpoint protection, backups, and state provided resources instead of pushing new, expensive platforms.

  • Policies and procedures Create plain language policies for access, acceptable use, incident response, vendor management, and data handling that staff and board members can actually follow.

  • Training and awareness (without scare tactics) Provide short, practical education to help staff spot phishing, fraud, and ransomware without blame or fear based messaging.

  • Monitoring and incident response Build playbooks for detecting issues, containing incidents, recovering systems, and meeting HB 96 reporting timelines to state agencies and the Auditor of State.

  • Ongoing compliance Do regular reviews, updates, and documentation so you stay ready for audits and funding conversations instead of checking a box once and hoping for the best.

In simple terms: I act as your fractional cybersecurity and compliance lead, using your existing tools to give you an enterprise style program on a small government budget.For manufacturing, defense, and specific healthcare clients, I use the same structured approach but focus on NIST 800-171, CMMC, and relevant regulatory expectations.


How I WorkI do not just drop off documents and disappear. I stay involved long enough to make sure your cybersecurity program actually works in real life, not just on paper.In the first year, I am on site two to three times a week for the first two weeks for HB 96, or up to six weeks for CMMC, NIST, or HIPAA work. During this time, I get you set up, meet your people, learn your environment, and deliver quick wins.
For the rest of that first year, I come in monthly to review what has changed, tune controls, answer questions, and help with any incidents or audit needs. After the first year, I visit quarterly to make sure things are still working, new systems are covered, your documentation is updated, and nothing has quietly broken in the background.
This rhythm keeps you in compliance, catches problems early, and gives your staff a familiar local person they can turn to for help.

Local government:* hand holding, done with youFor townships, districts, libraries, and schools:I design and implement an HB 96 aligned program with you, not just hand you a report and walk away. I configure security settings, draft policies, run trainings, help with incident drills, and support real incidents if they happen. I meet in person according to your tier (more frequent for Tier 1, less for Tiers 2 and 3, remote first for Tier 4) and stay available for questions between visits. I can also join board or council meetings to explain the program in clear, non technical language so leaders know what they are approving and why it matters.

Manufacturing / defense / specific healthcare – advisory onlyFor select private organizations, I provide strategy and guidance through risk and gap assessments, program design, policy reviews, and prioritized roadmaps. Your internal team or existing vendors handle most of the day to day implementation. Engagements center on scheduled virtual meetings, written recommendations, and periodic check ins.

Who owns the systems and data?When we work together, your systems and your data stay yours.I use accounts on your systems with clearly defined permissions. I do not store your information on my personal devices. I use secure, government approved, cloud based tools so I can support you remotely when needed, but the data remains in your environment. If our engagement ends, you can turn off my access at any time, and nothing critical is stuck with me.Bad actors try to take control away from you by locking you out, encrypting your files, or misusing your data. I do the opposite. I help you stay in control and keep ownership, while I manage and maintain the cybersecurity program with you, not instead of you. We work as a team: your knowledge of your operations plus my security expertise.


Ready to talk? Email me to set up a call and put GOV, CMMC, or HIPAA in the subject line so I know where to focus.

The VeeSafe Technology Frameworks

The VEE™ Methodology
Practical approaches to OT cybersecurity for resource-constrained environments.
Developed by Vina Ta | Copyright © 2026 VeeSafe Technology LLC


Engineered for OT:Visibility (GRC THREAT HUNTING™)
→ Exposure (Technical Actuality (TA) OT‑CVE Standard TA Standard )
→ Execution
The VEE™ Methodology is a sequential, plain-language framework for implementing OT cybersecurity in small manufacturers, defense vendors, municipal facilities, and organizations with limited security resources.Unlike traditional approaches that speak “IT security language,” VEE brings security to OT by using operational and safety terminology that plant personnel already understand.

The Three Sequential Phases

Phase 1: VISIBILITY - Know What You Have
(GRC THREAT HUNTING™)

  • Zero dedicated security staff

  • Small budgets ($10K-$50K)

  • 1-2 IT generalists managing both IT and OT

  • Safety-first operational cultures

Why this comes first: You can’t protect what you don’t know exists. Use tools and documentation you already have.

Phase 2: EXPOSURE - Understand Your Risks
(Ta Standard)

  • Risk assessment in OT operational language

  • Compensating controls when patching isn’t safe

  • Integration with existing Process Hazard Analysis (PHA)

  • Safety-first decision making for cyber risks

Why this comes second: Once you know what you have (Visibility), assess risks in the context of operational safety and constraints.Critical principle: Sometimes NOT patching is the safer choice. VEE provides frameworks for documenting compensating controls and risk acceptance in operational terms.

Phase 3: EXECUTION - Respond and Improve

  • Incident response integrated with existing emergency procedures

  • All-hands-on-deck scenarios using operational roles

  • Recovery procedures that respect production schedules

  • Continuous improvement tied to maintenance cycles

Why this comes third: With visibility and risk understanding in place, you can respond effectively when incidents occur and continuously improve over time.


VISIBILITY = GRC THREAT HUNTING™
I hunt for hidden, human‑driven risks: misuse, mistakes, and social engineering paths, so you can fix them before they become incidents. Verizon's 2025 Data Breach Report shows that roughly 60% of breaches involve the human element, including error, social engineering, and malicious misuse that tools alone do not catch.
EXPOSURE = The Technical Actuality (TA) OT-CVE Standard
Translating IT vulnerability language to OT reality. When a CVE (Common Vulnerabilities and Exposures) is published, it is written for IT professionals and describes risk in generic, IT-centric terms that do not account for OT constraints

  • Can this be patched safely during operations?

  • What’s the testing requirement before deployment?

  • Is this an IT issue, OT issue, or both?

  • What are the risks of remediation vs. the vulnerability itself?

The TA Standard bridges this gap.

Example workflow:

1. Visibility: Using GRC THREAT HUNTING™, you discover you have 50 PLCs running firmware with known CVEs.
2. Exposure: Use TA Standard to assess which CVEs are actually exploitable in your segmented network, what remediation risks exist, and what compensating controls are appropriate
3. Execution: Implement patches during planned turnarounds, deploy compensating controls for accepted risks, document decisions in operational terms*

Implementation Support
VeeSafe Technology offers training, consulting, and implementation support for both frameworks:

  • VEE Methodology implementation (3-12 month engagements)

  • TA Standard training for your team

  • Assessment and gap analysis using these frameworks

  • Ongoing support and refinement

  • For implementation inquiries: Email: [email protected]


Why VEE Works

Traditional OT security guidance assumes:

  • Dedicated security teams

  • Substantial budgets

  • Enterprise-level tools

  • IT security expertise

VEE is designed for facilities that have:

  • Zero dedicated security staff

  • Small budgets ($10K-$50K)

  • 1-2 IT generalists managing both IT and OT

  • Safety-first operational cultures

VEE Builds On Existing Programs:

VEE Builds On Existing Programs:

  • • CISA Now/Next/Never → Maps to VEE phases

  • • Process Safety Management → Integrates with Exposure phase

  • • Emergency Response Plans → Extends to cyber incidents in Execution

  • • Change Management → Incorporates security into existing procedures

Who VEE Is For:

  • ✅ Small manufacturers (50-500 employees)

  • ✅ Defense vendors

  • ✅ Municipal water/wastewater systems

  • ✅ Township government facilities

  • ✅ Building automation environments

  • Any operations where safety always comes before security changes, and security budgets are limited

Contributing to Industry StandardsThese frameworks have been submitted to NIST for consideration in SP 800-82 Revision 4 to help address the gap in practical guidance for small and resource-constrained OT facilities.


VEE™, GRC Threat Hunting™, and Ta OT-CVE Standard are trademarks of VeeSafe Technology LLC. Full trademark notice

I help with HB96, CMMC/NIST, and HIPAA

Many Ohio organizations are being pulled into cybersecurity because of specific requirements, not because they suddenly want a security program.I build cybersecurity programs that are tailored to the compliance you actually face:

  • HB 96 / Ohio Revised Code 9.64 for local government cybersecurity

  • CMMC and NIST 800-171 for manufacturers and defense work

  • HIPAA, through partners, for protecting health information in specific healthcare settings

For each one, we design a program that fits that framework: the right policies, controls, training, and documentation for that requirement. If you happen to fall under more than one, I reuse work where it makes sense, but we still treat each compliance obligation clearly and separately so you know what box each control is checking.

MY HB 96 PROGRAM APPROACH

HB96 in plain languageHB 96 requires Ohio local governments to have a board approved cybersecurity program, train staff, manage risk, monitor systems, and report serious incidents. I help you put this into practice in a way your team can follow.Most township clients complete their HB 96 program in 4 to 6 weeks.Many will have zero IT staff and tight budgets, just like you. Our flat rate pricing means no surprise bills.

  • Cybersecurity policies tailored to your budget and staff size

  • Incident response playbooks your team can actually use

  • Risk assessments that identify your real vulnerabilities

  • Training for staff who handle sensitive data

  • Ongoing support to keep you compliant

While HB 96 is a state requirement, my SAM.gov registration means I can also support projects that use federal cyber or grant funding when those opportunities arise.If you are a small township, village, fire district, or suburban community anywhere in this circle around Cuyahoga Falls, I can come on site and help you build a real HB 96 cybersecurity program.

CMMC Consulting for Ohio Defense Contractors

CMMC in plain languageCMMC is the Defense Department’s way of making sure contractors and many small manufacturers protect sensitive government information and can prove it during assessments. I help you figure out which level you actually need, find the gaps, write your security plan, and get ready for assessment in a way that fits your size and budget.As a SAM.gov–registered small business, I’m set up to support federal and DoD‑related cybersecurity and compliance work alongside your internal team. If you’re a Northeast Ohio manufacturer working on or chasing DoD contracts, CMMC is now part of doing business; my job is to make it clear and manageable instead of overwhelming.CMMC Level 1 – basic cyber hygiene (advisory only)
Best for manufacturers that handle Federal Contract Information (FCI). I review your current security, identify gaps, and help you document the 17 required practices while your IT team or MSP handles the hands‑on changes.
Typical timeline: about 3–6 months, depending on where you’re starting.
CMMC Level 2 – advanced protection (advisory only)
Required if you handle Controlled Unclassified Information (CUI). This follows all 110 NIST 800‑171 practices; I guide what needs to be in place, help build your POA&M, and prepare you for a C3PAO assessment when needed, while your IT or MSSP implements the controls.
Typical timeline: about 6–18 months, depending on your environment and how quickly you can make changes.
I’ve supported automotive and manufacturing environments in getting CMMC‑ready, and no two facilities are the same, so we start with a short VeeRisk Snapshot to understand your environment and scope the work appropriately.


Ready to investigate?

VeeSafe Pricing
Ethical, fair pricing and guidance that builds YOUR team’s capability



Base service meets HB 96 and CMMC using free government resources (MS‑ISAC, CISA, FEMA), including training, policy templates, basic IR, board briefings, and audit prep.Optional add-ons are available if you need more than baseline compliance. No pressure.

💳 Payment Terms
When: Monthly invoice, net 30 days
How: Check, ACH, or credit card
Contract: Month-to-month, cancel anytime
Setup fee due: At contract signing
Base rate increases: Locked for 12 months

Free Lunch & LearnNot ready to commit? I offer a free 30–45 minute Lunch & Learn for your team covering:

  • What HB 96 or CMMC actually requires (in plain English)

  • The top gaps that fail audits

  • Free tools that meet requirements

  • Real pricing (no games) and when add‑ons make sense

Format: in‑person at your office (you provide lunch) or virtual (Zoom/Teams). No sales pitch, just useful info.
Your cost: Free.
To request one, email me and mention “Lunch & Learn.”
VeeRisk Gap Analysis (Full Assessment)Free VeeRisk Snapshot (15–30 minutes)

  • Quick read on your current posture

  • Ballpark cost estimate

  • Honest “Are we a fit?” conversation

  • No obligation

Full VeeRisk Gap Analysis (Paid)

  • Full review of all HB 96 or CMMC controls

  • Detailed gap report with prioritized fixes

  • Written roadmap and implementation timeline

  • Cost: 1.5× your base monthly rate (one‑time), credited toward Year 1 if you move forward

Cybersecurity Oversight (for Organizations with IT Staff)
Already have IT handling the hands‑on work and just need a cybersecurity lead?
What’s included: strategy and compliance guidance, quarterly reviews, priorities for your IT team, policy updates, compliance monitoring, and on‑call questions.What you handle: your IT staff implements technical controls, administration, and configuration.Pricing:

  • Initial gap analysis: 1.5× your base monthly rate (one‑time)

  • Ongoing oversight: 0.5× your base monthly rate

Great for organizations with IT staff that want expertise and accountability, not another MSP.Optional Enhanced Capabilities
Base service meets compliance. Add these only if needed:

Advanced Monitoring – Security Operations Intelligence
Monthly threat briefings, prioritized patch guidance, and critical alerts.
Local Gov: +$300–$925/month | Manufacturing: +$750–$4,500/month.

Incident Response Management Lite
Active help during incidents (beyond the basic IR plan).
Local Gov: $200–$750/month or $150–$300/hour
Manufacturing: $500–$2,000/month or $250–$500/hour

Community Workshops
Online safety talks and AI literacy sessions for schools, libraries, churches, business groups, and senior centers. Topics include:

  • Cybersecurity basics: phishing awareness, password security, cyber hygiene (included in annual bundle)

  • AI literacy & safety: what AI is and how it works, AI security basics, responsible AI use, spotting AI-generated content (deepfakes, voice cloning), safe use of AI tools (ChatGPT, etc.)

Pricing: $200–$1250 per 45–60 minute session, depending on audience size and customization. If booked outside a bundle, sessions are available à la carte.



Local Government (HB 96 Programs)

How Pricing WorksPricing is based on your organization's annual budget size. Then apply income-based discounts (0-60% off for lower-income communities).

Local Government ENTITIES (Based on Annual Budget)

Annual BudgetGap Analysis FeeSetup Fee (One-Time)Base Monthly Rate
Under $1M$825$2,500$550
$1M–$2M$1,050$3,500$700
$2M–$4M$1,275$4,500$850
$4M–$7M$1,650$6,000$1,100
$7M–$10M$2,100$7,500$1,400
Over $10MCustomCustomCustom

Applies to townships, fire/EMS, libraries, health districts, water/sewer utilities, SWCDs, and all other local government entities.
Gap Analysis = 1.5x base monthly rate. Creditable toward setup fee if you engage within 90 days.
WHAT'S INCLUDED IN YOUR MONTHLY RATE✓ All 24 HB96 controls documented
✓ GASB cybersecurity compliance documentation
✓ Written policies and procedures
✓ Quarterly check-ins after Year 1
✓ Audit-ready documentation package
✓ Staff security awareness training using FREE government resources (MS-ISAC, CISA, FEMA modules)
WHAT'S NOT INCLUDED IN BASE RATELocal Government - What’s NOT Included
✗ Software purchases (we use free tools you already own or government-approved free software)
✗ Hands-on IT work (your IT person or vendor does implementation)
✗ Active incident response support (basic IR plan IS included; active incident handling available as optional add-on)
✗ Custom security training (FREE government training IS included; custom branded content available as optional add-on)
✗ Proactive threat intelligence briefings (compliance monitoring IS included; sector-specific threat intel available as optional add-on)
✗ Travel fees outside Cuyahoga Falls (see distance tiers below)

Apply Income-Based DiscountI adjust pricing based on your community’s wealth.

TierIncome bandPoverty bandDiscount
A+ Affluent100k+<15%0%
A Well‑off85k–100k15–25%0%
B Mixed70k–85k25–40%15–25%
C Working55k–70k40–55%40–50%
D High poverty<55k55%+50–60%

Adjusted for distance from Cuyahoga Falls and community income/poverty indicators so lower‑income communities aren’t paying “affluent suburb” rates.

ADD-ONSHIPAA Compliance (Fire/EMS and Health Districts)
+$250–$1,500/month (based on community tier)
Travel Fees (based on distance from Cuyahoga Falls)
Tier 1 (10-15 min): $0 per visit
Tier 2 (15-30 min): $7 per visit
Tier 3 (30-45 min): $15 per visit
Tier 4 (45-70 min): $25 per visit

Compare to separate consultants: $15,000–$25,000
Your savings: $9,000–$19,000

What Happens After Year 1?
Year 1: Heavy Lifting (documentation, implementation, training)
• 2-3 visits per week first 2 months
• Monthly visits months 3-12
• Full setup and implementation
Year 2+: Maintenance Mode
• Quarterly check-ins (4 per year)
• Annual compliance assessment
• Annual policy updates
• Annual training refresh
• Ad-hoc support via email/phone
Annual Compliance Assessment (Starting Year 2)
• HB96 compliance review and gap analysis
• Updated policy documentation for law changes
• Review of new systems/assets
• Updated risk assessment
• Board presentation with compliance status

If one of these fits what you need, email with a short description of your situation or schedule & we’ll match you to the right option.

Many small governments recover their HB 96 investment by avoiding a single serious incident or by qualifying for grants and funding that expect a real cybersecurity program.


Manufacturing & Private-Sector (CMMC/NIST)

Advisory-Only Model for Manufacturing
For manufacturers, VeeSafe provides strategic CMMC/NIST compliance guidance; your MSSP or internal IT team handles all hands‑on technical implementation.
✓ We guide what to implement for CMMC compliance
✗ We don’t configure firewalls, routers, or security infrastructure
✗ We don’t replace your MSSP or IT team
Base advisory uses free government NIST templates and CMMC resources, with optional add‑ons available.Manufacturing & Private-Sector Pricing (before modifiers)
CMMC advisory pricing is based on CMMC level and employee count, with a modifier for multiple locations when needed.

CMMC Level 1 (17 Basic Practices)
For clients with: Basic contract terms, no technical data (Federal Contract Information FCI only)
What we assess:

  • Access control, MFA, physical security, basic cyber hygiene

  • Gap report showing which of 17 practices need work

  • Timeline: 3-6 months

  • Self-assessment only (no C3PAO required)

CMMC Level 1 – Advisory Only (Manufacturing & Private Sector)
Pricing is based on your annual DoD contract value.

Contract Value (Annual)Year 1 (Assessment + Build)Year 2+ (Maintenance)
Under $500K$8,500$5,200/year
$500K–$2M$10,500$6,400/year
$2M–$5M$13,000$7,800/year
$5M+$15,500$9,400/year

New to DoD Work? (Pursuing First Contract)
Add a one‑time setup fee equal to 0.5× your Year 1 amount to cover SAM registration support, basic contract readiness, and baseline documentation.
CMMC Level 2 (110 Practices)
For clients with: Technical drawings, specs, export-controlled data (Controlled Unclassified Information CUI)
What we assess:

  • All 110 NIST 800‑171 controls across 14 domains

  • Critical gaps that would block the 88% minimum score

  • Which gaps can go on a POA&M (when allowed)

  • Whether a self‑assessment is enough or a C3PAO assessment is required

  • Typical advisory timeline: 6–18 months, depending on scope and readiness

Contract Value (Annual)Year 1 (Assessment + Build)Year 2+ (Maintenance)
Under $500K$25,500$15,600/year
$500K–$2M$31,500$19,200/year
$2M–$5M$39,000$23,400/year
$5M+$46,500$28,200/year

Level 2 pricing reflects the much heavier scope (110 practices) and third‑party assessment prep, and is roughly three times the Level 1 advisory effort and cost for similar contract sizes.C3PAO Assessment Prep (Level 2)
For organizations heading into a third‑party CMMC Level 2 assessment, I offer focused readiness support so you walk in organized and confident.
What’s included:

  • Evidence mapping and documentation review (SSP, POA&M, policies, diagrams)

  • Mock assessor-style questions and interview prep for key staff

  • Readiness check against the CMMC Level 2 assessment guide and common assessor expectations

C3PAO prep add‑on: typically 25–50% of your Level 2 Year 1 advisory fee, depending on scope and timeline (quoted during proposal).HIPAA Advisory (Startup & Small Clinics)HIPAA support available for eligible clinics and health entities; scoped and priced similar to CMMC Level 1, with a small uplift for privacy and patient‑data work.Multi-Location Modifier
If you have more than one facility:
• Standard modifier: +25% for multiple locations (covers extra onsite visits, duplicate documentation, coordination across sites)
• Larger/more complex additional facilities: Up to +50% modifier (agreed upfront before starting)
What’s Included in CMMC Advisory
✓ Strategic CMMC/NIST compliance guidance (advisory‑only, your IT/MSSP does the hands‑on work)
✓ Documentation of required CMMC practices and NIST 800‑171 controls (as applicable to your level)
✓ System Security Plan (SSP) and core written policies and procedures
✓ NIST 800‑171 gap analysis and prioritized roadmap
✓ POA&M development support for Level 2 clients
✓ Optional C3PAO assessment prep add‑on for Level 2 (evidence mapping, mock questions, readiness check)
✓ Quarterly check‑ins after Year 1 and staff security awareness training using free government resources

What’s NOT Included
✗ Emergency IT support or break‑fix work
✗ Hands‑on technical implementation (your MSSP/IT team does this)
✗ Active incident response handling (beyond the basic IR plan; full IR help is an optional add‑on)
✗ Custom security training (beyond free government training, available as an optional add‑on)
✗ Proactive threat‑intelligence briefings (available as an optional add‑on)
✗ C3PAO assessment fees (paid directly to the assessor)
✗ Travel fees for work outside the Cuyahoga Falls area


If one of these fits what you need, email with a short description of your situation or schedule & we’ll match you to the right option.

Many clients recover their CMMC investment with a single defense contract award or renewal.

About Vina Ta & VeeSafe Technology


Cybersecurity Made HumanMy mission is straightforward: I do cybersecurity so you can focus on your business and your community. VeeSafe Technology gives small organizations in Northeast Ohio (townships, districts, and manufacturers) practical cybersecurity that fits how you actually operate. No jargon, no overcomplicated solutions. Just honest, calm help from someone who understands your world.Vision: Northeast Ohio thrives when the organizations that keep it running can do their work safely and confidently. Local governments, manufacturers, and community services are the backbone of this region. This company exists for the people who make that happen.Why VeeSafe TechnologyVeeSafe is intentionally small, local, and personal. I've built cybersecurity programs for automotive manufacturers and led IT/OT vulnerability management at a Northeast Ohio steel operation, so I understand production lines, downtime, and how losing a contract or suffering an outage ripples through an entire community.I work in person with your team whenever possible, so you're never left alone with a binder and a checklist. I'm local to Northeast Ohio, which means I understand your budgets, staffing realities, and community pressures. I speak simply and avoid jargon so trustees, clerks, teachers, operators, and board members can all follow along.I charge fair prices that scale to your size and community. Things like township revenue or percentage of students on free and reduced lunch matter because cybersecurity shouldn't take money away from services.As a Vietnamese American woman in cybersecurity, I'm part of a very small group. That perspective helps me open doors and build networks for clients. As a woman owned and minority owned business, I can also help you meet diversity and small business participation goals in grants, contracts, and vendor policies.My BackgroundI'm Vina, and I live right here in Cuyahoga Falls. My parents came to the U.S. as refugees and moved to Youngstown, so I grew up valuing stability, hard work, and anything that supports families and communities. Manufacturing and local government both do that through steady jobs, safe services, and by quietly keeping everything running.I left corporate life on good terms to focus on what I care about most: helping small Ohio governments meet HB 96, helping manufacturers navigate CMMC and NIST, and doing it in a way that's straightforward and human.Beyond the WorkCybersecurity isn't just about plants and contracts for me. I teach people of all ages how to stay safe online. Grandparents at senior centers, parents protecting their families, teens learning smart habits, and kids getting the basics in a fun way. I give talks at libraries and community groups because I like seeing the lightbulb turn on and watching people feel more confident. When I'm not doing cybersecurity, I love ballroom dancing.If you're in Northeast Ohio and need straightforward help, whether it's an HB 96 program for your township or a CMMC roadmap for your plant, let's talk. Email me at [email protected] or call me at 330-559-0886. You actually get to talk with me, not AI or an automatic message/reply.

Woman owned | Minority owned | Based in Northeast Ohio.

Vina Ta, Northeast Ohio CMMC compliance consultant and manufacturing cybersecurity expert

Credentials & Real-World Experience

Third-Party Validation:

Industry Credentials & Commitments:

  • Federal contracting ready – Active and in good standing in SAM.gov, so agencies and primes can work with VeeSafe Technology as a registered small business vendor.

  • Cloud Security Alliance - AI Trustworthy Pledge Signatory (2026)

  • CMMC Compliance Specialist - Helping Northeast Ohio manufacturers secure government contracts through Cybersecurity Maturity Model Certification.

  • Youth STEM Educator - Founder of Northeast Ohio VeeSTEM Defender, inspiring the next generation of ethical cybersecurity professionals.

  • Community Partner - Partnering with libraries, schools, and organizations to provide accessible cybersecurity education for all ages.

Vina Ta, Northeast Ohio CMMC compliance consultant and manufacturing cybersecurity expert

If you’re a Northeast Ohio manufacturer or local government and want help staying secure and compliance‑ready, let’s talk.

Let's Keep This Simple

Let Me Handle the Security. You Handle Everything Else.Whether you're a township trustee figuring out HB 96, a manufacturer pursuing your first defense contract, or a school district protecting student data, VeeSafe Technology helps you navigate cybersecurity requirements without disrupting operations or overwhelming your team.Not Sure Where to Start?Schedule a free VeeRisk Snapshot to understand where you stand. We'll talk through your current situation, identify gaps, and map out practical next steps. No sales pressure. Just honest assessment and clear guidance from someone who understands both your operations and cybersecurity compliance.What happens next: After you reach out, we'll schedule a 30-minute call to discuss your needs. If it makes sense to work together, I'll send a straightforward proposal. If not, I'll point you toward resources that can help.I'm based in Cuyahoga Falls and work throughout Northeast Ohio, including but not limited to Summit, Stark, Portage, Cuyahoga, Medina, Lake, and Mahoning counties.

Already know you need help?
You get me, not AI or an automatic reply. I’ll respond within one business day, usually sooner. Email a short description of your situation, plus (HB96/CMMC/NIST/HIPAA) and timeline. I usually reply within one business day.


VeeSafe Technology Privacy Policy

Last Updated: January 2026The Short VersionWe collect minimal information, protect what we do collect, and give you control over your data. No surprises, no fine print tricks.What We CollectInformation you give us:
- Name, email, phone (when you reach out or book a call)
- What you tell us during consultations
Information collected automatically:
- Google Analytics data (how people use the site, but not who you are)
- Cookies for site functionality
- IP address for security
What we DON'T collect:
- Credit card information
- Social security numbers
- Any sensitive business data (unless you're a client under separate agreement)
How We Use Your InformationPretty straightforward:
- Respond to your questions
- Schedule consultations
- Understand how people use the site (so we can make it better)
- Comply with legal requirements if needed
We don't:
- Sell your data
- Spam you with marketing emails
- Share your information with third parties (except tools like Google Analytics)
## Your Control (GDPR Rights)If you're in the EU (or anywhere, really, we treat everyone the same):You can:
- See what data we have about you
- Correct anything that's wrong
- Delete your data completely ("Right to be Forgotten")
- Export your data
- Opt out of analytics anytime (use the cookie banner at the bottom)
Just email us: [email protected]## How We Protect Your Data- HTTPS encryption (the lock icon in your browser)
- Automatic email redaction after 30 days (we delete inquiry emails unless you become a client)
- Limited access (only Vina sees your information)
- No unnecessary data storage (we only keep what we need)
- Regular security updates
## Third-Party Tools We UseGoogle Analytics 4:
Helps us understand site traffic (like "50 people visited the pricing page"). We can't identify individual visitors, and analytics only run if you consent via the cookie banner.
Consentmanager.net:
Manages your cookie preferences (that banner at the bottom of the site).
## How Long We Keep Data- Inquiry emails: 30 days, then auto-deleted (unless you become a client)
- Client data: Kept per our client agreement (typically during engagement + 2 years)
- Analytics data: 14 months (Google's default)
- Cookies: 2 years or until you clear them
## Changes to This PolicyIf we change how we handle data, we'll update this page and note the date at the top.---## Questions?Privacy inquiries:
Vina Ta
VeeSafe Technology
[email protected]
Cuyahoga Falls, OH, USA
By using this site, you agree to this Privacy Policy.VeeSafe Technology | Cybersecurity Made Human

Last Updated: January 2026The Short VersionWe collect minimal information, protect what we do collect, and give you control over your data. No surprises, no fine print tricks.What We CollectInformation you give us:
- Name, email, phone (when you reach out or book a call)
- What you tell us during consultations
Information collected automatically:
- Google Analytics data (how people use the site, but not who you are)
- Cookies for site functionality
- IP address for security
What we DON'T collect:
- Credit card information
- Social security numbers
- Any sensitive business data (unless you're a client under separate agreement)
How We Use Your InformationPretty straightforward:
- Respond to your questions
- Schedule consultations
- Understand how people use the site (so we can make it better)
- Comply with legal requirements if needed
We don't:
- Sell your data
- Spam you with marketing emails
- Share your information with third parties (except tools like Google Analytics)
## Your Control (GDPR Rights)If you're in the EU (or anywhere, really, we treat everyone the same):You can:
- See what data we have about you
- Correct anything that's wrong
- Delete your data completely ("Right to be Forgotten")
- Export your data
- Opt out of analytics anytime (use the cookie banner at the bottom)
Just email us: [email protected]## How We Protect Your Data- HTTPS encryption (the lock icon in your browser)
- Automatic email redaction after 30 days (we delete inquiry emails unless you become a client)
- Limited access (only Vina sees your information)
- No unnecessary data storage (we only keep what we need)
- Regular security updates
## Third-Party Tools We UseGoogle Analytics 4:
Helps us understand site traffic (like "50 people visited the pricing page"). We can't identify individual visitors, and analytics only run if you consent via the cookie banner.
Consentmanager.net:
Manages your cookie preferences (that banner at the bottom of the site).
## How Long We Keep Data- Inquiry emails: 30 days, then auto-deleted (unless you become a client)
- Client data: Kept per our client agreement (typically during engagement + 2 years)
- Analytics data: 14 months (Google's default)
- Cookies: 2 years or until you clear them
## Changes to This PolicyIf we change how we handle data, we'll update this page and note the date at the top.---## Questions?Privacy inquiries:
Vina Ta
VeeSafe Technology
[email protected]
Cuyahoga Falls, OH, USA
By using this site, you agree to this Privacy Policy.VeeSafe Technology | Cybersecurity Made Human

VeeSafe Technology Trademark & Licensing

COPYRIGHT AND TRADEMARK NOTICEThe VEE™ Methodology (Visibility, Exposure, Execution), GRC Threat Hunting™, and the Technical Actuality (Ta) OT-CVE Standard are proprietary frameworks and services developed by Vina Ta and VeeSafe Technology LLC.Copyright © 2026 VeeSafe Technology LLC. All rights reserved.Trademark Notice: VEE, GRC Threat Hunting, and Ta OT-CVE Standard are trademarks of VeeSafe Technology LLC (registration pending). Unauthorized commercial use of these framework names, methodologies, or service names without permission is prohibited.Government and Standards Bodies: NIST, CISA, and other federal/state agencies are welcome to reference, incorporate, or adapt the VEE Methodology and Ta OT-CVE Standard for public guidance purposes.Commercial Implementation: Organizations implementing these frameworks for their own internal use are welcome to do so. Consultants, trainers, and commercial entities wishing to offer services based on these frameworks should contact VeeSafe Technology for licensing or partnership opportunities.Academic and Research Use: Researchers and educators may reference these frameworks with proper attribution.For licensing, partnerships, or questions:
Email: [email protected]

Frequently Asked QuestionsDo you work with local government or just manufacturers?
I work with both. I help small Ohio governments (townships, libraries, fire/EMS, health, schools) build and maintain HB 96 cybersecurity programs, and I advise manufacturers and service providers on CMMC and NIST 800‑171 compliance.
What is HB 96 and why does it matter?
HB 96 is Ohio’s cybersecurity law for political subdivisions. It requires a real cyber program with risk assessment, controls, policies, training, incident response, and ransomware/incident reporting rules, and auditors now expect clear evidence you are doing these things.
Who counts as a political subdivision under HB 96?
Counties, townships, cities, villages, school districts, libraries, and other local public bodies are all covered. If you are a local public entity serving an Ohio community, HB 96 likely applies to you.
What is CMMC and why do manufacturers need it?
CMMC (Cybersecurity Maturity Model Certification) is the Defense Department’s standard for protecting federal data. If you are in the DoD supply chain, even as a small shop or subcontractor, you need the right CMMC level to bid, win, and keep contracts.
How is CMMC different from HB 96 or HIPAA?
HB 96 is a state requirement for Ohio local governments. HIPAA protects health information for clinics and health entities. CMMC is a federal requirement tied to defense contracts and NIST 800‑171. Many security practices overlap, so I design one program that can support multiple frameworks instead of three separate systems.
How long does this take?
Most small governments can stand up a working HB 96 program in a few months with focused effort. Most manufacturers reach CMMC readiness in about six to eighteen months, depending on starting point, number of gaps, and how quickly changes can be made.
Do you implement the controls?
No. I am advisory‑only. I assess where you are, design the program, create documentation, train your team, and review their work. Your staff or your IT/MSSP handles the hands‑on implementation so you stay in control of your systems.
What if we don’t have IT staff?
You still have options. I can coach a designated staff member on the basics, guide your existing IT provider or MSP to implement to the right standard, and, when needed, refer trusted Northeast Ohio partners for deeper technical help.
Do you only work in Northeast Ohio?
My primary in‑person area is Northeast Ohio, roughly within seventy minutes of Cuyahoga Falls. I also work remotely with some organizations in the rest of Ohio when a mostly‑remote advisory relationship makes sense.
How do you work with us over the first year and after?
Year 1 is buildout: more frequent working sessions to get risk assessment, documentation, and key controls in place. After Year 1, we shift into maintenance with scheduled check‑ins, annual reviews, and policy/training refreshes so the program stays alive instead of becoming shelf‑ware.
Do you work on our systems or yours?
I work inside your environment using accounts you control. Your data stays with you; I do not keep copies of your systems on my own devices. I use secure cloud tools for documentation when appropriate, and you can remove my access at any time. Bad actors try to take control away from you; I do the opposite and help you keep control.
What is OT and why does it matter for cybersecurity?
OT (operational technology) is the equipment and control systems that run physical processes like machines, production lines, pumps, and treatment systems, as opposed to IT, which manages business data and emails. When OT is connected to IT networks, cyberattacks can shut down operations or damage equipment, so I design programs that protect both your business systems and your physical operations.
Why is CMMC Level 2 so much more than Level 1?
Level 1 is basic practices and a self‑assessment. Level 2 covers 110 practices mapped to NIST 800‑171, requires much deeper documentation, and often involves a third‑party assessment, so it is several times more work than Level 1. I help you confirm which level you truly need before you invest.
How does new‑hire training work?
I provide short, repeatable security training you can plug into orientation. For manufacturers, that may be a quarterly or semi‑annual session; for local governments, simple materials and periodic refresh sessions keep people from forgetting what to do.
What if we start small and need more later?
That is normal. You can start with a basic HB 96 program or CMMC Level 1 advisory and add capabilities (like Level 2 work, monitoring, or incident‑response help) as your risk, size, or contracts grow. We build on what you already have instead of restarting from scratch.
Can multiple organizations share workshop costs?
Yes. Townships, libraries, schools, or manufacturers can pool together for a shared workshop and split the fee so each pays less while still walking away with practical steps and templates they can use.
Do rates change as we grow or shrink?
Yes. Every quarter we look at your employee count or scope. If you move into a higher tier, your rate adjusts up; if you move down, your rate goes down for future months. The goal is fair pricing that moves with your reality instead of locking you in.
Why should we choose you instead of a big firm?
I’m local, I show up in person, and I speak in plain language. I focus on smaller governments and manufacturers that big firms overlook, bring real OT and critical‑infrastructure experience, and tie pricing to your budget and community so cybersecurity feels doable instead of overwhelming.