Blog Posts

Unlocking Cybersecurity Maturity

8 Steps to Unlocking Cybersecurity Maturity

Risk & security management have become an essential part of business and organizational health and success. The process of managing risk and compliance can seem overwhelming, but it does not have to be. By properly implementing an Information Security & Risk Management plan and ...
Documentation is essential to manage risk

Importance of Documentation in Cyber Maturity – David Glenn

The business world has become increasingly interconnected and having a well-documented information security plan is now table stakes. With data breaches and cyber-attacks becoming more frequent and sophisticated, companies must be proactive in protecting their assets and ensuring ....

Industry Profile: How a Fortune 1000 Manufacturing Leader Built a System for Cyber Maturity

With the current industry maze of framework goals and compliance mandates, privacy rules and overall increased risk to organizational data, third party vendor risk and increased threats both economic and cyber/risk, it is sometimes difficult to know where to start....

The FTC Extends Financial Services Safeguards Rule from December 9, 2022 to June 9, 2023!

Good news! Regardless of whether you hustled to meet the deadline and have everything ready for inspection and compliant, or have yet to finalize your Information Security Program, the FTC has extended the deadline for six months for certain provisions of the changes made.....

Beyond HIPAA Compliance… – Robert Hill and Dave Glenn

Conducting a security risk gap analysis to establish a baseline is a critical first step in working towards cybersecurity and risk management maturity. This process involves objectively analyzing your current state against a framework to understand your security and risk posture.....

Achieving CMMC – Tangible Lessons from the Field

SMB defense contractors handling CUI are already required to meet the NIST 800-171 standards for protecting their data, but many are confused on how to get started and what tools to use. Join our upcoming webinar to help you and your cybersecurity team prepare for NIST 800-171 compliance and the DoD’s mandated Cybersecurity Maturity Model Certification (CMMC) program. The webinar will provide practical answers and solutions regarding:

When: August 29th, 2023.
Time: 1:00pm ET, 10:00am PT

Prioritized Remediation for CMMC Compliance – Access Control

Cyturus Technologies, Armis, and Carahsoft assembled a panel of seasoned industry veterans and innovators to demonstrate proven methods for assisting your organization in identifying managed and unmanaged assets, devices, and software, measuring specific risks, and then creating systems and processes for enforcement automation, threat alerting, and prioritized remediation actions.

When: March 10th, 2022.
Time: 11:00AM ET

Making Sense of CMMC: Establishing a Risk and Compliance Management System

With recent changes to the Cybersecurity Maturity Model Certification (CMMC), increased threats and risk to organizational data, third party vendor risk, and increased numbers of compliance and framework requirements, it is sometimes difficult to know where to start. Join us as Carahsoft and Cyturus bring a panel of seasoned industry veterans and innovators to provide you with proven ways to help your organization be prepared to meet the objectives of CMMC and other requirements. Additionally, you will be provided with an ongoing model for continual improvement and prioritized risk remediation.

When: January 20th, 2022.
Time: 2:00PM ET