Hello, Guest!

Tag: cybersecurity maturity model certification

GovCon Expert Payam Pourkhomami: The CMMC 2.0 Accreditation Ecosystem ExplainedCybersecurity

GovCon Expert Payam Pourkhomami: The CMMC 2.0 Accreditation Ecosystem Explained

By Payam Pourkhomami, President & CEO of OSIbeyond Those familiar with the Cybersecurity Maturity Model Certification, especially its updated 2.0
GovCon Expert Payam Pourkhomami Explains the Difference Between NIST SP 800-171 and CMMC 2.0—Part 2Cybersecurity

GovCon Expert Payam Pourkhomami Explains the Difference Between NIST SP 800-171 and CMMC 2.0—Part 2

By Payam Pourkhomami, President & CEO of OSIbeyond Read part one here What is the difference between NIST SP 800-171
Zscaler’s Jeffrey Adorno, C3’s Ryan Heidorn: Zero Trust Could Help Accelerate CMMC ComplianceCybersecurity

Zscaler’s Jeffrey Adorno, C3’s Ryan Heidorn: Zero Trust Could Help Accelerate CMMC Compliance

Jeffrey Adorno of Zscaler and Ryan Heidorn of C3 Integrated Solutions said zero trust could help accelerate the compliance of
Quzara’s Saif Rahman: DIB Organizations Should Put Emphasis on Security Visibility, Maintain SOC CapabilityCybersecurity

Quzara’s Saif Rahman: DIB Organizations Should Put Emphasis on Security Visibility, Maintain SOC Capability

Saif Rahman, CEO and co-founder of Quzara, said defense industrial base organizations looking to comply with the Department of Defense’s
PreVeil’s Sanjeev Verma on Protecting Controlled Unclassified Information for CMMC, DFARS ComplianceCybersecurity

PreVeil’s Sanjeev Verma on Protecting Controlled Unclassified Information for CMMC, DFARS Compliance

Sanjeev Verma, founder and chairman of PreVeil, said defense contractors seeking to protect sensitive controlled unclassified information while ensuring compliance
Keeper Security’s Mike Eppes on Meeting CMMC Requirements With Zero Trust-Based Password Management ToolsCybersecurity

Keeper Security’s Mike Eppes on Meeting CMMC Requirements With Zero Trust-Based Password Management Tools

Mike Eppes, director of public sector at Keeper Security, said password management is one of the areas the Cybersecurity Maturity
HP Federal’s Matt Barry on Significance of Endpoint Security by DesignCybersecurity

HP Federal’s Matt Barry on Significance of Endpoint Security by Design

Matt Barry, chief operating officer at HP Federal, noted that threat actors can use endpoints as vectors that could enable
Cyturus CEO Robert Hill on Need to Secure Every Supply Chain Link to Protect US Defense CapabilitiesCybersecurity

Cyturus CEO Robert Hill on Need to Secure Every Supply Chain Link to Protect US Defense Capabilities

Robert Hill, founder and CEO of Cyturus, highlighted the importance of complying with regulatory requirements like the Department of Defense’s
Cytellix’s Brian Berger on Transforming Cybersecurity Through Governance, Risk & Compliance Combined With MDRCybersecurity

Cytellix’s Brian Berger on Transforming Cybersecurity Through Governance, Risk & Compliance Combined With MDR

Brian Berger, president of Cytellix, said merging governance, risk and compliance with managed detection and response could enable organizations to
GovCon Expert Payam Pourkhomami Ventures Into the New Era of DOD Cybersecurity With the Proposed CMMC 2.0 Rule (Part Two)GovCon Expert

GovCon Expert Payam Pourkhomami Ventures Into the New Era of DOD Cybersecurity With the Proposed CMMC 2.0 Rule (Part Two)

By Payam Pourkhomami, President & CEO of OSIbeyond Read part one here. What are the biggest changes in the new