About Cybersecurity Notes
Most compliance programs are theater. I’ve watched companies spend six figures on security tools they never configure, write policies nobody reads, and collect evidence for audits that prove nothing about actual risk.
I’m Peter Skaronis. I run Techimpossible Security, a consultancy in Vancouver that helps small and mid-sized companies get through SOC 2, ISO 27001, and HIPAA. More importantly, I help them build programs that actually reduce risk, not just check boxes.
I’ve been in the field long enough to know the difference between a compliance program that survives an audit and one that survives a breach. They’re not the same thing, and most of the content out there doesn’t acknowledge this.
What you’ll find here:
Observations from real client engagements. The stuff that surprised me, the patterns that keep showing up, the gaps between what frameworks say and what actually works.
Practical guides and frameworks you can actually use. Vendor risk assessments, policy templates, implementation checklists. The resources I wish existed when I started doing this work. Not theory. Not 50-page whitepapers. Tools you can pick up and apply to your next project.
No definitions you can find on Wikipedia. No career advice for people trying to break into the industry.
If you’re a practitioner doing this work (internal security teams, consultants, founders who got handed “security” as a side quest), this is for you.
I’m opinionated. I’ll tell you when something’s broken. I’ll also tell you when I was wrong.
— Peter
This is a Techimpossible project.

