How to Create a Comprehensive Access Control Policy: Template & Example

Art Clomera Vice President, Operations Granting access to a valuable resource is a question of trust (conditional authorization) and necessity (continuous authentication). For example, consider a company office building. Some areas are publicly accessible, while others are restricted to specific personnel. These restricted areas may have confidential information or sensitive equipment and therefore are limited […]

How to Conduct Cybersecurity Compliance Risk Assessments in 4 Steps

Shawn Elliott, Vice President, Federal Solutions In an organizational context, “being in compliance” refers to an organization conforming to the applicable standards and rules set by governing entities. These standards and rules can be both external (e.g. laws, industry standards, regulations) or internal (e.g. company policies). Failure to adhere to applicable standards can lead to […]

RMF Continuous Monitoring: How to Keep Your Cybersecurity Program Up to Date

RMF Continuous Monitoring

Art Clomera Vice President, Operations In today’s fast-paced digital landscape, cybersecurity threats are constantly evolving, making it crucial for Federal agencies to keep their defenses current. Risk Management Framework (RMF) Continuous Monitoring is a process that enables organizations to keep a watchful eye on their cybersecurity program and respond to emerging threats in a timely […]

How to Write a Security Assessment Report (SAR) Using a Template

Art Clomera Vice President, Operations Implementing effective security controls for information systems is a vital and complex undertaking. All Federal agencies require cybersecurity control measures in one form or another – and assessing their effectiveness is a challenge. Due to the complex and quickly evolving nature of cybersecurity threats, it can be difficult to accurately […]

How to Build Your System Security Plan (SSP) with Examples and Template

Art Clomera, Vice President Operations Information system development, use, and eventual decommissioning requires a lot of paperwork – reports, signatures, manuals, approvals, and more. Amongst this mountain of documentation, the System Security Plan (SSP) may well be the granddaddy of them all. It is the encyclopedia and guidebook of all security aspects related to the […]

How to Create a NIST Risk Assessment Report (with Template)

Art Clomera Vice President, Operations It doesn’t do a lot of good to think about cybersecurity risks in generalities. It’s even worse to not think about them at all. Imagine contracting a security firm whose slogan was “We’ll wing it!”   Such vagueness invariably leads to a reactive – and, by definition, porous – risk posture […]

Six Lessons Learned from the CrowdStrike Outage Disaster

CrowdStrike IT Outage

The recent CrowdStrike outage reminds us of our digital infrastructure’s fragility. As 8.5 million devices crashed and critical services were disrupted worldwide, we must rethink our approach to IT resilience. What can federal agencies learn from this teachable moment? Read our complete analysis.