Training Image

Cyber AB CMMC CRT Platform Training

Join us for live sessions powered by Cyturus Technologies to provide training on the platform and to answer any questions for the benefit of the RPO community.

Tuesday’s – 11:00am EST; 8:00am PST
Thursday’s – 1:00pm EST; 10:00am PST

Achieving CMMC – Tangible Lessons from the Field

SMB defense contractors handling CUI are already required to meet the NIST 800-171 standards for protecting their data, but many are confused on how to get started and what tools to use. Join our upcoming webinar to help you and your cybersecurity team prepare for NIST 800-171 compliance and the DoD’s mandated Cybersecurity Maturity Model Certification (CMMC) program. The webinar will provide practical answers and solutions regarding:

When: August 29th, 2023.
Time: 1:00pm ET, 10:00am PT

Prioritized Remediation for CMMC Compliance – Access Control

Cyturus Technologies, Armis, and Carahsoft assembled a panel of seasoned industry veterans and innovators to demonstrate proven methods for assisting your organization in identifying managed and unmanaged assets, devices, and software, measuring specific risks, and then creating systems and processes for enforcement automation, threat alerting, and prioritized remediation actions.

When: March 10th, 2022.
Time: 11:00AM ET

Making Sense of CMMC: Establishing a Risk and Compliance Management System

With recent changes to the Cybersecurity Maturity Model Certification (CMMC), increased threats and risk to organizational data, third party vendor risk, and increased numbers of compliance and framework requirements, it is sometimes difficult to know where to start. Join us as Carahsoft and Cyturus bring a panel of seasoned industry veterans and innovators to provide you with proven ways to help your organization be prepared to meet the objectives of CMMC and other requirements. Additionally, you will be provided with an ongoing model for continual improvement and prioritized risk remediation.

When: January 20th, 2022.
Time: 2:00PM ET

HIPAA Compliance Healthcare Cybersecurity

Beyond HIPAA Compliance… – Robert Hill and Dave Glenn

Conducting a security risk gap analysis to establish a baseline is a critical first step in working towards cybersecurity and risk management maturity. This process involves objectively analyzing your current state against a framework to understand your security and risk posture…..

philipp-katzenberger-iIJrUoeRoCQ-unsplash-Custom.jpg

Issues at Facebook – Robert Hill

Yesterday’s Facebook outage caught a lot of people off guard and created a great deal of speculation. Facebook has gone, in the space of ~17 years, from a narrow scope social tool built in a dorm room to a monster tech giant with its tentacles into many aspects of everyday life……

markus-spiske-FXFz-sW0uwo-unsplash-Custom.jpg

Why Cybersecurity – Jeff Ellis

The Information Age created an insatiable desire to make decisions based on facts and data, rather than intuition, whether it be credit decisions, medical decisions, industrial decisions or other types of behavioral decisions. All of this lead to a creation of vast amounts of data….