Building ROMs for Cybersecurity Needs: A Guide for Federal Agencies

R. Shawn Elliott President and LLC Manager IPKeys Technologies, LLC | Chickasaw Nation Industries (CNI) Cybersecurity budgeting is rarely straightforward, since threats evolve faster than procurement cycles. That’s why Rough Order of Magnitude (ROM) estimates are so valuable. Whether you’re managing FedRAMP authorizations or preparing for next year’s funding cycle, a solid ROM gives you […]

Proactive IT Risk Management: Building Resilience in an Evolving Digital World

R. Shawn Elliott President and LLC Manager IPKeys Technologies, LLC | Chickasaw Nation Industries (CNI) 2024 brought some harsh cybersecurity lessons for everyone working in U.S. government cybersecurity. One major wake-up call came when Chinese hackers broke into several U.S. telecom networks in an attack dubbed Salt Typhoon.   Then came an unexpected hit. CrowdStrike, which […]

Security Assessment Report (SAR) Template, Guide, and Examples

Art Clomera Vice President, Operations Implementing effective security controls for information systems is a vital and complex undertaking. All Federal agencies require cybersecurity control measures in one form or another – and assessing their effectiveness is a challenge. Due to the complex and quickly evolving nature of cybersecurity threats, it can be difficult to accurately […]

How to Apply the 7 Risk Management Framework (RMF) Process Steps

Art Clomera, Vice President, Operations We’ve all heard the adage: “Nothing ventured, nothing gained.” In essence, you have to risk something if you want to get things done. So much of our lives involves assessing risk and intelligently managing those risks to meet our needs and achieve our goals. It’s why a motorcyclist wears a […]

Six Lessons Learned from the CrowdStrike Outage Disaster

CrowdStrike IT Outage

The recent CrowdStrike outage reminds us of our digital infrastructure’s fragility. As 8.5 million devices crashed and critical services were disrupted worldwide, we must rethink our approach to IT resilience. What can federal agencies learn from this teachable moment? Read our complete analysis.