How to Apply the 7 Risk Management Framework (RMF) Process Steps

Art Clomera, Vice President, Operations We’ve all heard the adage: “Nothing ventured, nothing gained.” In essence, you have to risk something if you want to get things done. So much of our lives involves assessing risk and intelligently managing those risks to meet our needs and achieve our goals. It’s why a motorcyclist wears a […]

Six Lessons Learned from the CrowdStrike Outage Disaster

CrowdStrike IT Outage

The recent CrowdStrike outage reminds us of our digital infrastructure’s fragility. As 8.5 million devices crashed and critical services were disrupted worldwide, we must rethink our approach to IT resilience. What can federal agencies learn from this teachable moment? Read our complete analysis.

Elevating Efficiency with RPA: Five Real-World RPA Examples

examples of rpa

How did IPKeys develop and deploy over 100 RPA use cases across the Defense Logistics Agency’s (DLA) departments? How did we contribute +130,000 mission hours to DLA with Robotic Process Automation? How did we help the DLA achieve unattended automation architecture? Looking for RPA examples and process steps? We’re revealing our blueprint.

How to Build Your System Security Plan (SSP) with Examples and Template

Art Clomera, Vice President Operations Information system development, use, and eventual decommissioning requires a lot of paperwork – reports, signatures, manuals, approvals, and more. Amongst this mountain of documentation, the System Security Plan (SSP) may well be the granddaddy of them all. It is the encyclopedia and guidebook of all security aspects related to the […]