How to Write a Security Assessment Report (SAR) Using a Template

Art Clomera Vice President, Operations Implementing effective security controls for information systems is a vital and complex undertaking. All Federal agencies require cybersecurity control measures in one form or another – and assessing their effectiveness is a challenge. Due to the complex and quickly evolving nature of cybersecurity threats, it can be difficult to accurately […]

How to Build Your System Security Plan (SSP) with Examples and Template

Art Clomera, Vice President Operations Information system development, use, and eventual decommissioning requires a lot of paperwork – reports, signatures, manuals, approvals, and more. Amongst this mountain of documentation, the System Security Plan (SSP) may well be the granddaddy of them all. It is the encyclopedia and guidebook of all security aspects related to the […]

How to Create a NIST Risk Assessment Report (with Template)

Art Clomera Vice President, Operations It doesn’t do a lot of good to think about cybersecurity risks in generalities. It’s even worse to not think about them at all. Imagine contracting a security firm whose slogan was “We’ll wing it!”   Such vagueness invariably leads to a reactive – and, by definition, porous – risk posture […]

Six Lessons Learned from the CrowdStrike Outage Disaster

CrowdStrike IT Outage

The recent CrowdStrike outage reminds us of our digital infrastructure’s fragility. As 8.5 million devices crashed and critical services were disrupted worldwide, we must rethink our approach to IT resilience. What can federal agencies learn from this teachable moment? Read our complete analysis.

Demystifying the Meaning of Controlled Unclassified Information (CUI)

What is Controlled Unclassified Information (CUI)?

Art Clomera Vice President, Operations What is Controlled Unclassified Information (CUI)? The era of CUI before Executive Order 13556 was fragmented, haphazard, and far leakier than it is today.   Each agency had its own rules and procedures for handling unclassified information, leading to a complex, confusing jumble of policies. Sharing information across multiple government […]

From Risk to Authorization: Understanding What ATO Means in Cybersecurity

ATO in Cybersecurity

Art Clomera Vice President, Operations The Authorization to Operate (ATO) is crucial for the US Federal Government and the Department of Defense (DoD). It represents an official management decision granted by a senior organizational official. The ATO Cybersecurity decision authorizes the operation of an information system and explicitly acknowledges the associated risks to agency operations, […]