Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2022

Monitor the security and compliance posture of your Azure environment with Datadog

Governance, risk, and compliance (GRC) management presents some unique challenges for organizations that deploy a myriad of cloud resources, services, and accounts. Simple misconfigurations in any of these assets can lead to a serious data breach, and compliance issues become even more prevalent as organizations try to inventory and manage assets across multiple cloud platforms and security and auditing tools.

Securing the Digital Supply Chain Ep 8 - Terence Jackson CISO, SLG, Microsoft

In this episode of Securing the Digital Supply Chain we talk with terence Jackson, CISO at Microsoft for State and Local Government customers! We have a great time talking about the trends in the Software Supply Chain area as well what can CISOs focus on to get quick wins for their organizations. Terence brings a wealth of experience from small to medium scale to large enterprise organizations and applies them to various security challenges to effectively solve them.

Newly Proposed Rules from the SEC Mean New Requirements for the Financial Industry

On February 9, the U.S. Securities and Exchange Commission (SEC) issued proposed rules regarding cybersecurity risk management for investment advisers, registered investment companies, and business development companies. It's no surprise that the SEC is taking a more active role in this, given their continued interest in cybersecurity issues and high-profile ransomware attacks.

CMMC Town Hall With Jerry Leishman, CORTAC Group | 2/23/22 | NeoSystems

NeoSystems CMMC Town Hall Series: Join NeoSystems’ Chief Information Security Officer, Ed Bassett, for our weekly CMMC Town Hall designed for the Defense Industrial Base and GovCon community. Each session features special guests and offers an opportunity for attendees to ask questions regarding CMMC and cybersecurity. Topics covered include CMMC compliance requirements, how to prepare for CMMC certification, and the latest updates from the CMMC AB.

FedRAMP Cloud Service Providers and Services

Google adopted its cloud infrastructure, Google Cloud Platform (GCP), to be compliant with FedRAMP. GCP earned a FedRAMP High authorization to operate (ATO) for several cloud products in a handful of locations and has uplifted the current FedRAMP Moderate services to more products and locations. Government agencies can now work with the highest level of classified information using GCP.

OSCAL and FedRAMP Automation

The current FedRAMP Authorization process is a struggle. First, you must manage multiple regulatory standards and frameworks, which change over time. Second, regulatory standards and frameworks overlap in scope and can often conflict and be difficult to manage together. And, lastly, information systems continue to increase in size and complexity.

Securing the digital supply chain Ep 7 Yaser M

Yaser is a veteran in the construction industry and in this session we learn about what technologies are used in the construction technology sector, what are some of the gotchas that industry leaders should pay attention to and the various types of organizations that are there on the landscape..

NIST vs ISO Compliance: What's the Difference?

As businesses and health organizations seek to strengthen cybersecurity, they’re turning frequently to compliance frameworks to help prioritize, guide, and improve decision-making and implementation. Two of the more popular compliance frameworks are the NIST CSF and the ISO 27001. For IT teams seeking to better understand the difference between these frameworks, as well as which is the ideal tool for their business, here’s what to know.

Quick Guide on FedRAMP Fundamentals

The federal government enacted the FedRAMP regulation in December 2011 to enable executive agencies and departments to use an assessment method based on risk and cost-effectiveness when adopting cloud technologies. A FedRAMP readiness assessment is mandatory for cloud products and solutions providers seeking to receive an Authorization to Operate (ATO). FedRAMP ATO indicates that a provider’s hosted information and systems meet FedRAMP requirements.

Coralogix - On-Demand Webinar: Achieving Scale and Compliance During a Global Expansion

Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. With a hybrid environment of both single and multi-tenant infrastructures generating massive amounts of data, the team needed a powerful solution to centralize and manage their log data. In this session, Armis’s Head of DevInfra Roi Amitay discusses how his team leverages Coralogix’s unique capabilities together with custom-built dev tools to streamline the development and debugging of microservices on multiple EKS clusters.

CMMC Town Hall With Edward Spenceley, Bank of America | 2/16/22 | NeoSystems

NeoSystems CMMC Town Hall Series: Join NeoSystems’ Chief Information Security Officer, Ed Bassett, for our weekly CMMC Town Hall designed for the Defense Industrial Base and GovCon community. Each session features special guests and offers an opportunity for attendees to ask questions regarding CMMC and cybersecurity. Topics covered include CMMC compliance requirements, how to prepare for CMMC certification, and the latest updates from the CMMC AB.

Ep 6 Securing the digital supply chain featuring Prasad Ramakrishnan and Drew Daniels

In this episode of Securing the digital supply chain we talk with two extremely accomplished security thought leaders from the Bay Area - Prasad Ramakrishnan, who is currently the CIO of freshworks and Drew Daniels who is a seasoned security savant and currently a senior member of SVCI. Both our guests have storied pasts in many well known companies, from startups to IPOs. We discuss SDLC, how to create successful security programs, the ins and outs of software supply chain management and some easter egg nuggets for vendors on how to approach CIOs and CISOs!

Logit.io Achieves Cyber Essentials Certification

We are pleased to announce that we’ve recently attained Cyber Essentials certification with the NCSC in addition to our existing compliance with PCI DSS, SOC 2 & ISO 27001. The NCSC (National Cyber Security Centre) is the UK authority for monitoring cybersecurity incidents, conducting threat assessments and acts as an overarching technical authority for mitigating cyber threats.

SOX Audit Compliance Requirements For 2022

Sarbanes Oxley Act is a popular US law designed and enforced to secure investors against fraudulent accounting activities in the organization. The objective of enforcing this regulation is to bring in transparency and ensure efficiency in the work process. It is a regulation that is not just an obligation for organizations but also seen as a good practice in the industry. Elaborating on the regulation, VISTA InfoSec conducted a live webinar explaining the Act in detail. Watch the video to learn more about this popular regulation enforced across the US.

Ep 5 Securing the digital supply chain - Sai Kalur

In this episode of Securing the digital supply chain we talk to one of the luminary stars in IT, security from the Bay Area - Sai Kalur. Sai talks about SDLC, software development processes, best practices, the considerations that drive pharma and health-tech companies. A great discussion for CISOs, CIOs, and security thought leaders.

Video Blog: 5 HR/Payroll Tips to Start Fast in a New Calendar Year

Through UKG Pro, NeoSystems provides Payroll Administration and Tax Management, Compliance, Benefits Management, Open Enrollment, Recruiting, and On-Boarding as well as property, skills, and certification tracking – all through a cloud-based manager & employee self-service platform.

CMMC Town Hall With Amira Armond, Kieri Solutions & Jeff Dalton, CMMC AB | 2/9/22 | NeoSystems

NeoSystems CMMC Town Hall Series: Join NeoSystems’ Chief Information Security Officer, Ed Bassett, for our weekly CMMC Town Hall designed for the Defense Industrial Base and GovCon community. Each session features special guests and offers an opportunity for attendees to ask questions regarding CMMC and cybersecurity. Topics covered include CMMC compliance requirements, how to prepare for CMMC certification, and the latest updates from the CMMC AB.

ISO/IEC 27001 Compliance Self-Assessment: The Ultimate ISO 27001 Requirements Checklist

For organizations looking to reassure customers that excellent data governance is one of their guiding principles, and that they’re doing everything in their power to mitigate the risk posed by cybercrime, ISO/IEC27001 certification is one of the best ways to demonstrate that commitment. Nevertheless, it’s a high standard to achieve. According to data supplied by ISO.org, only 28,426 companies worldwide had achieved the certification by 2022.

ISO/IEC 27001 Compliance Self-Assessment: The Ultimate ISO 27001 Requirements Checklist

For organizations looking to reassure customers that excellent data governance is one of their guiding principles, and that they’re doing everything in their power to mitigate the risk posed by cybercrime, ISO/IEC27001 certification is one of the best ways to demonstrate that commitment. Nevertheless, it’s a high standard to achieve. According to data supplied by ISO.org, only 28,426 companies worldwide had achieved the certification by 2022.

New Year, New Features in Xray

Let’s start 2022 off the right with new features and updates that will extend JFrog Xray’s power and reach in addressing challenges with securing your binaries from development to production. Join Sarit Tager, VP Product Security as she discusses how Xray provides intelligent supply chain security and compliance at DevOps speed. JFrog Xray is a software composition analysis (SCA) solution that scans your open source software (OSS) dependencies for security vulnerabilities and license compliance issues.

User Created Content with Tripwire Configuration Manager

Tripwire Configuration Manager allows for user created configuration and compliance management content via a new Policy Management capability. Custom user content can be used alongside existing cloud service provider and third-party SaaS policies, providing multiple new use cases for data gathering and expanding policy compliance support into new services. This blog will describe some of the features and use cases for the Policy Management capability.

Ep 4. Securing the Digital Supply Chain - Ken Carter, Jacob Elziq

We talk about supply chain risk, GDPR, Data Audits, how companies can make sure their processes for transferring data to 3rd parties remain on track. Jacob highlights the interplay between DevOps and security. A very interesting discussion indeed. For full disclosure - Armature Systems is a partner of Riscosity, and helps clients with purchasing, deploying, and operationalizing Riscosity's platform..

Channeling Regulatory Requirements into Practical Cyber Risk Assessments

Does the saying "compliance does not equal security" paint a holistic picture? Sure, the concept is genuine; meeting a single compliance standard will not directly improve security posture. However, after working with hundreds of organizations, we have learned there are key considerations that can help maximize the value and urgency of compliance requirements by channeling such efforts into more practical risk assessments.

PCI Compliance in the Age of Cloud Native Tech

The Payment Card Industry Data Security Standard (PCI DSS) entered the scene back in 2004 with the rise of payment fraud. Created by leaders in the credit card industry, PCI DSS was developed to provide a baseline of technical and operational requirements designed to protect cardholder payment data and was commonly understood by those in the legacy security world.