Existing CMMC to CMMC 2.0 Mapping

Existing CMMC to CMMC 2.0 Mapping

It is known throughout the defense industries that the CMMC 2.0 requirements are going to be in effect.  For those of you who built your documentation mapped to the original requirements here are the mappings from the original CMMC Level 3 requirements to CMMC 2.0...
Improve Your Third-Party Risk Management Program in Four Steps

Improve Your Third-Party Risk Management Program in Four Steps

News continues to break on organizations facing fines, data loss, and shutdowns due to a lack of due diligence in their vendor selection process and the introduction of new vulnerabilities into their environment. Most recently, Delta, Sears, and four energy companies...
Why a Third-Party Cyber Risk Management Program is Essential

Why a Third-Party Cyber Risk Management Program is Essential

The cyber threat landscape is changing and expanding with the cost benefits of outsourcing. As a result, attack surfaces frequently extend beyond the purview of the enterprise; third-party provider operating risks may be misunderstood or unacknowledged. In order to...
18 Reasons to Care More About Data Privacy in 2018

18 Reasons to Care More About Data Privacy in 2018

Yesterday was Data Privacy Day, and as a Data Privacy Champion, we advocate for committing resources towards protecting the information that is a valuable asset to your business. We believe that traditional technical controls are only one part of security, and that’s...
Critical Infrastructure – Securely Integrate New Technology

Critical Infrastructure – Securely Integrate New Technology

The nation’s critical infrastructure – the power grid, communication channels, financial systems, etc. – that we rely on, increasingly requires cybersecurity expertise and management in today’s connected world. From protecting the intellectual property that drives our...