{Spring 2022} Issue
Volume 11 | Number 32

4 Regulatory Frameworks: Retain and Grow Your Client Base
When it comes to data security and compliance, both domestically and internationally, companies must appropriately structure and properly equip their internal environments to mitigate risk and issues. In doing so, companies demonstrate that security is a

Moving Toward a “Continuous Adaptive Trust”
The term “Zero Trust” is the lack of implicit trust. When we started with “zero trust,” we no longer trusted users because they weren’t on our network domain. As our staff went remote, we had to input stronger authentication

U.S. Army C5ISR Center CSSP: Leading the Way to a Defend Forward Stance
DOD CSSP Program: A Plateau Difficult to Overcome Since its establishment in 2001, the Department of Defense (DOD) Cybersecurity Service Provider (CSSP) Program (hereafter Program) has progressively and systematically matured to become one of the most

CECOM SEC’s Women of Cyber
Aberdeen Proving Ground, MD – The true strength of the U.S. military comes from its diversity. There is not just a diversity of weaponry, equipment, and tactics used on the battlefield with the widely adopted concept

Cyber Talent: Hiding in Plain Sight
We live in a time when ransomware attacks, nation-state “cyber warfare,” and having a remote workforce is the norm rather than the exception. If you ask most company executives, particularly those responsible for protecting company information

Making Better Cyber Risk Decisions By Architecting the Choices
“Victory awaits him who has everything in order. Defeat is certain for him who has neglected to take all the necessary precautions in time.” Roald Amundsen, on the South Pole. Uncertainty, chaos, and luck – why