• Home
  • Services
  • Professional Background
  • Education
  • Gov Con Resources
  • More
    • Home
    • Services
    • Professional Background
    • Education
    • Gov Con Resources
  • Sign In
  • Create Account

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • Services
  • Professional Background
  • Education
  • Gov Con Resources

Account


  • My Account
  • Sign out


  • Sign In
  • My Account

Leslie Weinstein's Experience

Military Background

Advisory and Consulting Experience

Government Experience

Leslie enlisted in the U.S. Army Reserves after graduating from the University of Alabama in Huntsville with her Bachelor of Science in Management of Information Systems (MIS). In the Army, Leslie served as an intelligence analyst until she commissioned as an Adjutant General (AG) officer. After a tour to Afghanistan with the 101st Airbor

Leslie enlisted in the U.S. Army Reserves after graduating from the University of Alabama in Huntsville with her Bachelor of Science in Management of Information Systems (MIS). In the Army, Leslie served as an intelligence analyst until she commissioned as an Adjutant General (AG) officer. After a tour to Afghanistan with the 101st Airborne Division, Leslie became an intelligence officer and has served on active duty in support of full-time U.S. Cyber Command operations. Leslie has also served on active duty with the Defense Intelligence Agency (DIA) and served as a liaison officer with Army Cyber Command at the Pentagon. As a reservist, Leslie's most recent assignment was with the Army CIO/G6. 

Government Experience

Advisory and Consulting Experience

Government Experience

Leslie served as a Federal Civilian and as a Consultant directly supporting  the Department of Defense (DoD) for more than 10 years. As a consultant, Leslie supported the DoD CIO, the Office of the Undersecretary of Defense for Acquisition and Sustainment (OUSD (A&S)), and the Air Force A2. In her roles as a consultant, Leslie contributed

Leslie served as a Federal Civilian and as a Consultant directly supporting  the Department of Defense (DoD) for more than 10 years. As a consultant, Leslie supported the DoD CIO, the Office of the Undersecretary of Defense for Acquisition and Sustainment (OUSD (A&S)), and the Air Force A2. In her roles as a consultant, Leslie contributed to the development of several DoD cyber policy efforts, including the DoD Cyber Workforce Framework and the "DIB Task," which eventually became the DoD's Cybersecurity Maturity Model Certification (CMMC).  

Advisory and Consulting Experience

Advisory and Consulting Experience

Advisory and Consulting Experience

With extensive Big 4 consulting experience and an MBA from Cornell University, Leslie has several years of experience in delivering tailored cybersecurity advisory and consulting services to enterprise-level organizations across diverse industries. Having also worked as a solo practitioner, Leslie brings a unique understanding of the chal

With extensive Big 4 consulting experience and an MBA from Cornell University, Leslie has several years of experience in delivering tailored cybersecurity advisory and consulting services to enterprise-level organizations across diverse industries. Having also worked as a solo practitioner, Leslie brings a unique understanding of the challenges faced by small businesses, offering practical and strategic solutions to meet their needs.  Regardless of the size and shape of your organization, Leslie has provided  advisory and consulting services regarding the identification and designation of controlled unclassified information (CUI), the DoD CMMC program, and NIST 800-171. Leslie provides customized, and actionable strategies that enhance cybersecurity resilience, address regulatory requirements, and align with your business objectives. 

Areas of Expertise

Defense and Federal Contracting

Cybersecurity Requirements for Government Contractors

CMMC

Leslie directly supported the DoD policy offices responsible for publishing the CMMC and has maintained a close eye on the evolution of the CMMC program. 

DFARS 7012 and NIST 800-171

As the foundation of the CMMC requirement, the DFARS 7012 clause and NIST 800-171 have served as the foundation of the DoD's cybersecurity requirements for defense contractors since 2015.

Controlled Unclassified Information (CUI)

Leslie's background as an intelligence officer at the DIA makes Leslie one of the only cybersecurity consultants who has full-time government experience identifying sensitive and controlled data. Leslie can help you develop a number of solutions relating to the identification, designation, and safeguarding of CUI. 


Regulated Industries

Regulatory compliance requirements for businesses in specific industries.

Health Care Industry

  • HIPAA Security Rule:  Protects individuals' electronic personal health information.
  • HIPAA Privacy Rule: Establishes national standards to protect individuals' medical records and other individually identifiable health information (collectively defined as “protected health information”) and applies to health plans, health care clearinghouses, and those health care providers that conduct certain health care transactions electronically.

Financial Institutions

  • The Gramm-Leach-Bliley Act and the FTC's  Safeguards Rule: Requires covered financial institutions to develop, implement, and maintain an information security program with administrative, technical, and physical safeguards designed to protect customer information. 
  • Information Security Booklet: One of several that comprise the Federal Financial Institutions Examination Council (FFIEC) Information Technology Examination Handbook (IT Handbook).

Critical Infrastructure

  • Federal Regulations: Frameworks like the Cybersecurity & Infrastructure Security Agency's (CISA) directives or the Department of Homeland Security’s guidelines often dictate foundational requirements.
  • Risk Management: Regulatory standards, such as NIST Cybersecurity Framework or ISO/IEC 27001, emphasize assessing and managing cybersecurity risks in alignment with organizational and industry needs.
  • Incident Reporting: Many regulations mandate timely reporting of cyber incidents to regulators or sec

Third-Party Assessments

Leslie has experience advising clients on how to achieve conformance with the following third-party assessment schemes:

  • CMMC
  • ISO 27001
  • SOC 1
  • SOC 2
  • FedRAMP
  • TX-Ramp
  • HITRUST

What is CUI?

Copyright © 2025 The Cyber Advisor - All Rights Reserved.

Powered by

  • Home
  • Services
  • Professional Background
  • Education
  • Gov Con Resources

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept