Strategic Cybersecurity Consulting and Advisory Services with Natsar, offering tailored solutions to safeguard organizations and achieve business goals

Natsar Core Services

consulting icon

Consulting

From strategic planning to crisis response, our consulting services help organizations assess risk, strengthen programs, and align security with business goals. We advise executives, boards, CISOs, and startups through complex cybersecurity challenges, bringing clarity and results at every stage.

Virtual CISO Services

Our vCISO services offer strategic security leadership without the full-time commitment. We provide ongoing guidance, risk management, and executive support to build or mature cybersecurity programs—all tailored to your business needs.

Training & Education

We deliver practical online courses, career coaching, and interactive workshops—including tabletop exercises—for both individuals and teams. Our programs are built to educate, engage, and elevate cybersecurity readiness across all experience levels.

Organizations We've Worked With

Trusted by leading organizations across sectors for strategic cybersecurity advice and practical solutions. We invite you to join them.

Logos of organizations
Logos of organizations

Get Started with Natsar Today

Connect with Natsar to explore expert support, training, and solutions designed to meet your unique needs.

image of Natsar's principal, Josh Moulin

Meet Natsar's Principal

Josh Moulin

Josh brings over two decades of elite cybersecurity expertise and strategic leadership to Natsar. With a robust track record in government and private sectors, Josh has held significant roles including Senior Vice President at the Center for Internet Security (CIS), CISO and CIO within the U.S. Department of Energy nuclear weapons program, an Executive Partner at Gartner, and a commander of a law enforcement cybercrimes task force. In these high-stakes environments, he not only drove critical security initiatives but also provided high-level strategic advice, helping some of the largest organizations in the world navigate complex IT, cybersecurity, leadership, and risk management challenges. Known for his technical expertise, business acumen, and strategic insight, Josh is globally recognized as a trusted advisor frequently called upon to guide companies and governments around the world on advanced cybersecurity solutions and leadership strategies.

Latest Insights

Read the latest news and insights from Natsar

Water and wastewater cybersecurity illustration showing secure infrastructure and data protection in New York.

October 15, 2025

Understanding New York’s Proposed Cybersecurity Rules for Water and Wastewater Utilities

By: Josh Moulin

New York is mandating cybersecurity for water and wastewater systems. Learn what’s changing and how Natsar, a trusted NY firm, can help.

Water and wastewater cybersecurity illustration showing secure infrastructure and data protection in New York.

October 15, 2025

Comparing DOH and DEC Cybersecurity Requirements for New York’s Water Sector

By: Josh Moulin

Learn how New York’s DOH and DEC cybersecurity rules differ — and how Natsar helps water and wastewater utilities meet compliance affordably and on time.

Water and wastewater cybersecurity illustration showing secure infrastructure and data protection in New York.

October 15, 2025

Getting Ready for New York’s Water Cybersecurity Rules

By: Josh Moulin

Turn New York’s new water cybersecurity rules into an action plan. Natsar helps utilities assess, train, and comply efficiently and affordably.

Water and wastewater cybersecurity illustration showing secure infrastructure and data protection in New York.

October 15, 2025

How Natsar Can Help New York Water Utilities Get Compliant (and Stay Secure)

By: Josh Moulin

Natsar helps New York utilities meet DOH and DEC cybersecurity rules through vCISO, training, risk assessments, and compliance-ready programs.

Gloved hands examining a disassembled hard drive during a digital forensics process, with notes being taken on a clipboard in the background.

September 6, 2025

How to Start a Digital Forensics Lab the Right Way

By: Josh Moulin

Learn how to start a mission-driven digital forensics lab in the first post of our series based on real-world lab management experience.

Screenshot of CIS benchmark page

April 21, 2025

Scanning for Configuration Compliance

By: Josh Moulin

Discover how to use tools like CIS-CAT and SCAP to scan systems for compliance with security benchmarks and maintain secure configurations.

Person putting together a computer

April 14, 2025

Customizing Configuration Benchmarks for Your Organization

By: Josh Moulin

Learn how to adapt CIS Benchmarks and DISA STIGs to fit your business needs without compromising security or compliance.

Slide cover

March 31, 2025

How to Apply Security Benchmarks to Harden Your Systems

By: Josh Moulin

Using industry standards like CIS Benchmarks and DISA STIGs to reduce risk and enforce consistent configuration settings across your environment.

Configuration Compliance Lifecycle diagram showing define, deploy, scan, and update phases in a continuous cycle.

March 24, 2025

Getting Started with Configuration Management and System Hardening

By: Josh Moulin

Learn how configuration management and system hardening improve cybersecurity by reducing vulnerabilities and ensuring consistent, secure system setups.