Adversarial Machine Learning: What NIST’s Latest Report Means for AI Security

Shawn Elliott President, Operations AI systems now shape decisions from grid stability to national security—making them prime targets. Adversaries aim not only to breach systems, but also to manipulate the decision-making process at scale.  In response, NIST’s latest report on adversarial machine learning (NIST AI 100-2e2025), finally provides a standardized framework for identifying AI vulnerabilities, […]

The Top GRC Tools and Software for 2025

GRC Tools

Art Clomera Vice President, Operations Most organizations succeed (or falter) based on the information they keep and the sophistication with which they can manage it. It’s why having the right GRC tools in place to help manage governance, risk management, and compliance (GRC) issues around information has become a standard organizational strategy.   While CISOs […]

GRC in Cybersecurity: Why is it Important? 

GRC in Cybersecurity: Why is it Important?

Art Clomera Vice President, Operations Simply put, Governance, Risk, and Compliance (GRC) in cybersecurity fosters a culture of transparency, accountability, and trust by promoting good governance, effective risk management, and regulatory compliance. It originated from the Open Compliance and Ethics Group (OCEG) in 2002 and has become indispensable due to the increasing complexity of cybersecurity […]

Mastering POA&M Management: Strategies for Effective Continuous Monitoring and Success

POAM Risk Management

Art Clomera Vice President, Operations Plan of Action & Milestones (POA&M) management is the act of compiling a must-do list outlining the actions and milestones needed to address security vulnerabilities and weaknesses within an information system. To this end, a POA&M is a potent management tool because deadlines are assigned for each task, and team […]

How to Apply the 7 Risk Management Framework (RMF) Process Steps

Art Clomera, Vice President, Operations We’ve all heard the adage: “Nothing ventured, nothing gained.” In essence, you have to risk something if you want to get things done. So much of our lives involves assessing risk and intelligently managing those risks to meet our needs and achieve our goals. It’s why a motorcyclist wears a […]

Clarifying SSDF: An Overview of the Secure Software Development Framework

SSDF

Art Clomera Vice President, Operations In response to President Biden’s Executive Order on “Improving the Nation’s Cybersecurity (14028)“, the National Institute of Standards and Technology (NIST) designed the Secure Software Development Framework (SSDF). The creation of the SSDF was a strategic move to bolster the cybersecurity posture of Federal agencies. NIST also developed the Risk […]

Building ROMs for Cybersecurity Needs: A Guide for Federal Agencies

R. Shawn Elliott President and LLC Manager IPKeys Technologies, LLC | Chickasaw Nation Industries (CNI) Cybersecurity budgeting is rarely straightforward, since threats evolve faster than procurement cycles. That’s why Rough Order of Magnitude (ROM) estimates are so valuable. Whether you’re managing FedRAMP authorizations or preparing for next year’s funding cycle, a solid ROM gives you […]

Demystifying POAM: Definition, Template & Example Walkthrough

Art Clomera, CTO, Federal Services – Wouldn’t perfection be great?   Everyone, every organization, every system working exactly the way they should with inexhaustible, flawless precision from the word “Go.” Never worrying about something not going exactly as planned. It sounds pretty great but also pretty impossible… (even boring). Perfection in the world of cyber security […]

NIST 800-53: What is it and What are the Control Families?

Art Clomera, Vice President, Operations Ensuring the security of information systems is a complex but necessary task that virtually every modern organization must undertake to some degree or another. One effective method of tackling information system security is to use the Risk Management Framework (RMF) developed by the National Institute of Standard and Technology (NIST). […]

Cybersecurity Automation: How to Strengthen Defense While Reducing Manual Work

Cybersecurity Automation by IPKeys

Art Clomera Vice President, Operations India, the US, Indonesia, and China alone account for almost half of the total reported cyberattacks in the government sector. Threats, ranging from espionage to malware designed to disrupt critical national infrastructure, are a defining feature of modern geopolitical relations. This barrage demands always-on, predictive, continuously improving advanced cybersecurity measures.    […]