What Suppliers Need to be Doing Now: CMMC Roll-Out Update

Nearly half way through 2020, the roll-out of Cybersecurity Maturity Model Certification (CMMC) is progressing toward DoD’s objective of including CMMC requirements in some RFPs before the end of the year. The CMMC Accreditation Body is launching a Provisional Program that, for an initial set of contracts, will require Primes and their suppliers to complete […]

Mastering Cybersecurity Asset Management – Once and for All

Understanding your assets is the foundation of cybersecurity, right? So then why is asset management still such a monster of a problem? As IT environments become increasingly complex, teams are struggling to keep up

GRC Conference Virtual Event

ISACA and The IIA are pleased to once again collaborate to bring you the 2020 Governance, Risk, and Control (GRC) Virtual Conference.

KRIS FOR IT RISK MANAGEMENT IN A POST-PANDEMIC WORLD

The COVID-19 pandemic has forced organizations to adapt to the new realities of remote work, social distancing, and alternative working arrangements. The new policies introduced to govern these situations have stretched the limits of existing technology and operating capabilities—creating increasing exposure to existing and new IT risks

[CMMC Webinar] Get a Handle on CUI Before It’s Too Late

Controlled Unclassified Information (CUI) is an integral component of any DOD contract, and protecting the security of this information is every DOD contractor’s responsibility. CUI is critical to managing and protecting our nation’s Intellectual Property (IP). The DOD estimates over $600 billion are lost every year to data exfiltration, and that’s why CMMC and the […]

Data Protection in the Cloud

Data protection is a core principle of any security strategy and requires visibility into data-at-rest and data-in-motion for effective data loss protection (DLP) policies and rules. Combine this objective with the overwhelming use of cloud apps freely adopted by business units and users, as well as the increasing number of remote workers and the end […]

Lessons From Election Security Challenges

2020 is poised to be the most critical security landscape for elections – locally, nationally, and globally – and this issue will continue to grow and become more complex. Voter data is at risk of compromise, misinformation is rampant, and security issues – real or perceived – will remain regardless of regulation. What data analytics, […]

Would you like for your event to be displayed on the events calendar?  Submit cybersecurity related events using our event submission form.