Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Compliance

How Will ISO 27701 and the GDPR Affect Your Organization?

Companies today face increasing pressure to implement strong cybersecurity controls. While the U.S. has no comprehensive cybersecurity law, many organizations still fall under state, international, or industry regulations. Two of the most prominent controlling publications are the General Data Protection Regulation (GDPR), and the ISO 27701 standard. One has the force of law, and the other is a guiding framework, respectively. Both of these documents apply to an increasing number of businesses.

NeoSystems Names Susan Mitchell as CFO and Brad Wolf as Senior Vice President of IT Operations

TYSONS CORNER, Va., January 7, 2022 – NeoSystems, a full service strategic outsourcer, IT systems integrator and managed services provider to the government contractor market, has named Susan Mitchell as Chief Financial Officer and Brad Wolf as Senior Vice President of IT Operations.

What Organizations Need to Adapt to a Changing Cybersecurity Landscape

The future is already here. Is it everything we expected? That depends on who you ask, but the nightmare of maintaining cybersecurity has certainly persisted just as many sci-fi stories predicted. As we move further into the digital era, the stakes in cybersecurity only get higher and higher. So what are some of the main things that organizations should consider in building a solid cybersecurity strategy? Here are a few tips below.

What is ITAR Compliance?

Most organizations, especially those in the defense trade, are finding themselves on the spot when their prime contractors ask them whether they are ITAR Certified and ITAR Compliant. Some contractors even want to know the steps you're taking to meet this regulation. As a chief information security officer, you've probably heard of CPA and GDPR compliance and their role in consumer data. But, how well are you versed with International Traffic in Arms Regulations (ITAR)?

Practice vs Maturity in CMMC 2.0 Framework

When CMMC was first introduced by the DoD, its purpose was to “normalize and standardized cybersecurity preparedness across the federal government’s Defense Industrial Base or DIB.” Essentially, they recognized a weakness in cybersecurity hygiene practices in their supply chain, and so CMMC became the standard the DIB would be “graded” by to ensure the protection of sensitive or Controlled Unclassified Information (CUI).