Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

NeoSystems Names Susan Mitchell as CFO and Brad Wolf as Senior Vice President of IT Operations

TYSONS CORNER, Va., January 7, 2022 – NeoSystems, a full service strategic outsourcer, IT systems integrator and managed services provider to the government contractor market, has named Susan Mitchell as Chief Financial Officer and Brad Wolf as Senior Vice President of IT Operations.

What Organizations Need to Adapt to a Changing Cybersecurity Landscape

The future is already here. Is it everything we expected? That depends on who you ask, but the nightmare of maintaining cybersecurity has certainly persisted just as many sci-fi stories predicted. As we move further into the digital era, the stakes in cybersecurity only get higher and higher. So what are some of the main things that organizations should consider in building a solid cybersecurity strategy? Here are a few tips below.

What is ITAR Compliance?

Most organizations, especially those in the defense trade, are finding themselves on the spot when their prime contractors ask them whether they are ITAR Certified and ITAR Compliant. Some contractors even want to know the steps you're taking to meet this regulation. As a chief information security officer, you've probably heard of CPA and GDPR compliance and their role in consumer data. But, how well are you versed with International Traffic in Arms Regulations (ITAR)?

Understanding CMMC 2.0 Scoping Guide by the Department of Defense

The Department of Defense (DoD) has recently released new CMMC 2.0 audit and assessment scoping guides. The awaited CMMC 2.0 Level 1 and Level 2 scoping guides provide insight into how a certified CMMC third-party assessor organization (C3PAO) may scope the CMMC audit and how businesses can potentially scope their own environments. These scoping guides are critical for the CMMC audit and boundary diagrams developed as part of your business’s System Security Plan (SSP).

Dissecting FedRAMP NIST 800-53, NIST 800-171 & CMMC 2.0 Control Structure

Today we are going to discuss controls in the context of any variation of the NIST 800-53 and NIST 800-171 requirements. NIST SP 800-53 provides us with a fundamental understanding of how government and many commercial organizations structure control language.

More SEC Talk on Cyber, Internal Control

Before this particular bit of news sails downstream, internal control professionals might want to note that an SEC commissioner spoke this week about the importance of internal controls for cybersecurity. She raised a few points worth considering. The remarks came from Caroline Crenshaw, a Democratic appointee to the Securities and Exchange Commission who, in my opinion, is something of a stalking horse for SEC policy.