Introduction to Security Compliance PMO Although IT projects generally affect a portion of an organization using a new service or tools, security projects affect everyone, including partners. The shift in the C-Suite to include a Chief Information Security Officer...
Zero Trust is everywhere. It’s a topic of conversation at every board meeting, the agencies you work with frequently mention it, and you’re reading about it daily in Nextgov and Federal News Network. The Zero Trust approach to cybersecurity isn’t a new concept —...
Every day, we’re reading about the latest nation state and ransomware cybersecurity attacks. For each attack you read there are countless others that don’t receive news coverage. Foreign adversaries are pursuing our nation’s sensitive data at an accelerating rate to...
The recent U.S. Department of Defense’s (DoD) Federal Acquisition Regulations Supplement (DFARS 252.204-7012) Interim Rule has left many companies unsure of how to begin. A critical first step in this process is understanding that the decisions your organization makes...
With the announcement of the U.S. Department of Defense’s (DoD) Federal Acquisition Regulations Supplement (DFARS 252.204-7012) Interim Rule last fall, DoD contractors have been searching for guidance and answers to new data protection and governance rules surrounding...